Untriaged
Permalink
CVE-2024-3296
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Rust-openssl: timing based side-channel can lead to a bleichenbacher style attack
A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
References
Affected products
bootc
upstream
389-ds-base
rust-bootupd
rust-openssl
- *
rust-zincati
keylime-agent-rust
389-ds:1.4/389-ds-base
python3.12-cryptography
389-directory-server:next/389-ds-base
389-directory-server:stable/389-ds-base
389-directory-server:testing/389-ds-base
Matching in nixpkgs
pkgs._389-ds-base
Enterprise-class Open Source LDAP server for Linux
pkgs.python312Packages.cryptography
Package which provides cryptographic recipes and primitives
Package maintainers
-
@ners ners <ners@gmx.ch>
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>