Untriaged
Rust-openssl: timing based side-channel can lead to a bleichenbacher style attack
A timing-based side-channel exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Affected products
bootc
upstream
389-ds-base
rust-bootupd
rust-openssl
- *
rust-zincati
keylime-agent-rust
389-ds:1.4/389-ds-base
python3.12-cryptography
389-directory-server:next/389-ds-base
389-directory-server:stable/389-ds-base
389-directory-server:testing/389-ds-base
Matching in nixpkgs
pkgs._389-ds-base
Enterprise-class Open Source LDAP server for Linux
-
nixos-unstable -
- nixpkgs-unstable 3.1.3
pkgs.podman-bootc
Streamlining podman+bootc interactions
-
nixos-unstable -
- nixpkgs-unstable 0.1.2
pkgs.mlxbf-bootctl
Control BlueField boot partitions
-
nixos-unstable -
- nixpkgs-unstable 2025-01-16
pkgs.systemd-bootchart
Boot performance graphing tool from systemd
-
nixos-unstable -
- nixpkgs-unstable 235
pkgs.python312Packages.cryptography
Package which provides cryptographic recipes and primitives
-
nixos-unstable -
- nixpkgs-unstable 45.0.4
Package maintainers
-
@ners ners <ners@gmx.ch>
-
@Thesola10 Karim Vergnes <me@thesola.io>
-
@nikstur nikstur <nikstur@outlook.com>
-
@thillux Markus Theil <theil.markus@gmail.com>
-
@evan-goode Evan Goode <mail@evangoo.de>
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>
-
@brianmcgillion Brian McGillion <bmg.avoin@gmail.com>