CVE-2023-52323
Publication date 5 January 2024
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
pycryptodome | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy |
Fixed 3.11.0+dfsg1-3ubuntu0.1
|
|
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Notes
mdeslaur
Ubuntu 20.04 LTS and older contain a substantially older codebase which would require major intrusive changes to remediate all side-channel attacks. Due to the high risk of regressions, we will not be fixing this issue in focal and older. If this issue is critical in your environment, we recommend migrating to a more recent version of Ubuntu.
Patch details
Package | Patch details |
---|---|
pycryptodome |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6595-1
- PyCryptodome vulnerability
- 23 January 2024