Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Untriaged
created 1 week, 2 days ago
Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

Affected products

wolfSSL
  • <5.9.0

Matching in nixpkgs

Package maintainers