Bug 2308607 (CVE-2024-1543) - CVE-2024-1543 wolfssl: The side-channel protected T-Table implementation in wolfSSL
Summary: CVE-2024-1543 wolfssl: The side-channel protected T-Table implementation in w...
Keywords:
Status: NEW
Alias: CVE-2024-1543
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2308628 2308629
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-08-29 23:30 UTC by OSIDB Bzimport
Modified: 2024-08-30 20:59 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-08-29 23:30:30 UTC
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to:  https://doi.org/10.46586/tches.v2024.i1.457-500


Note You need to log in before you can comment on or make changes to this bug.