CVE-2019-16910

NameCVE-2019-16910
DescriptionArm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3249-1
Debian Bugs941265

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mbedtls (PTS)stretch (security), stretch (lts), stretch2.4.2-1+deb9u4vulnerable
buster (security), buster, buster (lts)2.16.9-0~deb10u1fixed
bullseye2.16.9-0.1fixed
bookworm2.28.3-1fixed
trixie2.28.8-1fixed
sid3.6.2-3fixed
polarssl (PTS)jessie, jessie (lts)1.3.9-2.1+deb8u4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mbedtlssourcebuster2.16.9-0~deb10u1DLA-3249-1
mbedtlssource(unstable)2.16.3-1941265
polarsslsourcewheezy(unfixed)end-of-life
polarsslsource(unstable)(unfixed)

Notes

[stretch] - mbedtls <no-dsa> (Minor issue)
[jessie] - polarssl <no-dsa> (Minor issue, backport intrusive because of API changes)
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-10
https://github.com/ARMmbed/mbedtls/commit/298a43a77ec0ed2c19a8c924ddd8571ef3e65dfd (2.7.12)
https://github.com/ARMmbed/mbedtls/commit/33f66ba6fd234114aa37f0209dac031bb2870a9b (2.16.3)

Search for package or bug name: Reporting problems