python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
Link | Tags |
---|---|
https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |