vulnerability
Arch Linux: Private key recovery (CVE-2020-16150)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Sep 2, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Sep 2, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length. The issue is fixed in Mbed TLS 2.24.0, 2.16.8 and 2.7.17.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-16150
- https://attackerkb.com/topics/CVE-2020-16150
- URL-https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OSOFUD6UTGTDDSQRS62BPXDU52I6PUA/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRPBHCQKZXHVKOP5O5EWE7P76AWGUXQJ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD3NM6GD73CTFFRBKG5G2ACXGG7QQHCC/
- URL-https://security.archlinux.org/ASA-202101-7
- URL-https://tls.mbed.org/tech-updates/security-advisories
- URL-https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-09-1
- CWE-203
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.