wolfSSL and wolfCrypt 4.1.0 and earlier (formerly known as CyaSSL) generate biased DSA nonces. This allows a remote attacker to compute the long term private key from several hundred DSA signatures via a lattice attack. The issue occurs because dsa.c fixes two bits of the generated nonces.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wolfssl | Wolfssl | * | 4.2.0 (excluding) |
Wolfssl | Ubuntu | bionic | * |
Wolfssl | Ubuntu | disco | * |
Wolfssl | Ubuntu | eoan | * |
Wolfssl | Ubuntu | trusty | * |
Wolfssl | Ubuntu | xenial | * |