{"id":"CVE-2019-16910","details":"Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)","modified":"2026-03-20T11:29:24.530033Z","published":"2019-09-26T13:15:10.790Z","related":["MGASA-2020-0053"],"references":[{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSFFOROD6IVLADZHNJC2LPDV7FQRP7XB/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEHHH2DOBXB25CAU3Q6E66X723VAYTB5/"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-10"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGSKQSGR5SOBRBXDSSPTCDSBB5K3GMPF/"},{"type":"FIX","url":"https://github.com/ARMmbed/mbedtls/commit/298a43a77ec0ed2c19a8c924ddd8571ef3e65dfd"},{"type":"FIX","url":"https://github.com/ARMmbed/mbedtls/commit/33f66ba6fd234114aa37f0209dac031bb2870a9b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbed-crypto","events":[{"introduced":"0"},{"fixed":"92348d1c4931f8c33c2d092928afca556f672c42"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.0"}]}},{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"14c6762351395ecf5d1fb141029d6cc349526846"},{"introduced":"8be0e6db41b4a085e90cb03983f99d3a5158d450"},{"fixed":"04a049bda1ceca48060b57bc4bcf5203ce591421"},{"introduced":"3f8d78411a26e833db18d9fbde0e2f0baeda87f0"},{"fixed":"4197f0e28e15c42e907f873eea292fac31bfa7e6"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.7.12"},{"introduced":"2.8.0"},{"fixed":"2.16.3"},{"introduced":"2.17.0"},{"fixed":"2.19.0"}]}},{"type":"GIT","repo":"https://github.com/mbed-tls/mbedtls","events":[{"introduced":"0"},{"fixed":"298a43a77ec0ed2c19a8c924ddd8571ef3e65dfd"},{"fixed":"33f66ba6fd234114aa37f0209dac031bb2870a9b"}]}],"versions":["beta-oob-2","list","mbedcrypto-0.1.0b","mbedcrypto-0.1.0b2","mbedcrypto-1.0.0","mbedcrypto-1.0.0d0","mbedcrypto-1.0.0d1","mbedcrypto-1.0.0d2","mbedcrypto-1.0.0d3","mbedcrypto-1.0.0d4","mbedcrypto-1.0.0d5","mbedcrypto-1.0.0d6","mbedcrypto-1.0.0d7","mbedcrypto-1.1.0","mbedcrypto-1.1.0d0","mbedcrypto-1.1.0d1","mbedcrypto-1.1.0d2","mbedcrypto-1.1.1","mbedcrypto-2.0.0d0","mbedcrypto-2.0.0d1","mbedos-16.01-release","mbedos-16.03-release","mbedos-2016q1-oob1","mbedos-2016q1-oob2","mbedos-2016q1-oob3","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-1.3.10","mbedtls-1.4-dtls-preview","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.15.0","mbedtls-2.15.1","mbedtls-2.16.0","mbedtls-2.16.1","mbedtls-2.16.2","mbedtls-2.17.0","mbedtls-2.18.0","mbedtls-2.19.0d1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.7.1","mbedtls-2.7.10","mbedtls-2.7.11","mbedtls-2.7.2","mbedtls-2.7.2-rc1","mbedtls-2.7.3","mbedtls-2.7.4","mbedtls-2.7.5","mbedtls-2.7.6","mbedtls-2.7.7","mbedtls-2.7.8","mbedtls-2.7.9","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.3","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","psa-crypto-api-1.0-beta1","psa-crypto-api-1.0-beta2","psa-crypto-api-1.0-beta3","yotta-2.2.1","yotta-2.2.2","yotta-2.2.3","yotta-2.3.0","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16910.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}