The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
References
Link | Resource |
---|---|
https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-566-dec-19-2023 | Release Notes |
Configurations
History
No history.
Information
Published : 2024-08-29 23:15
Updated : 2024-09-04 14:26
NVD link : CVE-2024-1543
Mitre link : CVE-2024-1543
CVE.ORG link : CVE-2024-1543
JSON object : View
Products Affected
wolfssl
- wolfssl