DescriptionA side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having low severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise SDK 11 SP4||Botan||Not affected|
|SUSE Linux Enterprise SDK 12 SP3||Botan||Not affected|
|SUSE Linux Enterprise SDK 12 SP4||Botan||Not affected|
|SUSE Linux Enterprise SDK 12 SP5||Botan||Affected|