Filed https://github.com/libtom/libtomcrypt/issues/407, let’s see when upstream comes up with a patch.
On Fri, Jun 15, 2018 at 9:22 PM, Salvatore Bonaccorso <car...@debian.org> wrote: > Source: libtomcrypt > Version: 1.18.1-1 > Severity: grave > Tags: security upstream > > Hi, > > The following vulnerability was published for libtomcrypt. > > CVE-2018-12437[0]: > | LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on > | ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. > | To discover an ECDSA key, the attacker needs access to either the local > | machine or a different virtual machine on the same physical host. > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2018-12437 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12437 > > Please adjust the affected versions in the BTS as needed. > > Regards, > Salvatore > -- Best regards, Michael