Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31886 | A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Wed, 06 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-12T20:05:19.621Z
Reserved: 2024-04-04T03:01:36.169Z
Link: CVE-2024-3296
Updated: 2024-08-01T20:05:08.371Z
Status : Awaiting Analysis
Published: 2024-04-04T14:15:11.080
Modified: 2024-11-21T09:29:20.493
Link: CVE-2024-3296
OpenCVE Enrichment
No data.
EUVD