IO FinNet tss-lib vulnerable to timing attack from non-constant time scalar multiplication
Critical severity
GitHub Reviewed
Published
Apr 21, 2023
to the GitHub Advisory Database
•
Updated Feb 5, 2025
Description
Published by the National Vulnerability Database
Apr 21, 2023
Published to the GitHub Advisory Database
Apr 21, 2023
Reviewed
Feb 5, 2025
Last updated
Feb 5, 2025
io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
References