First published: Fri Apr 21 2023(Updated: )
io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/binance-chain/tss-lib | <1.3.6-0.20230324145555-bb6fb30bd3eb | 1.3.6-0.20230324145555-bb6fb30bd3eb |
go/github.com/bnb-chain/tss-lib | <1.3.6-0.20230324145555-bb6fb30bd3eb | 1.3.6-0.20230324145555-bb6fb30bd3eb |
Binance TSS-lib | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-26557 is categorized as high due to the potential for sensitive data leakage through a timing side-channel attack.
To fix CVE-2023-26557, update the tss-lib library to version 2.0.0 or later.
CVE-2023-26557 affects versions of tss-lib before 2.0.0.
CVE-2023-26557 involves a timing side-channel attack that can leak the lambda value of a private key.
CVE-2023-26557 impacts the tss-lib library from both 'github.com/binance-chain' and 'github.com/bnb-chain'.