Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-5992


A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.


Published

2024-01-31T14:15:48.147

Last Modified

2024-11-21T08:42:56.353

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.6 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-203
  • Type: Secondary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application opensc_project opensc < 0.25.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 9.0 Yes
Operating System redhat enterprise_linux_eus 9.4 Yes
Operating System redhat enterprise_linux_for_arm_64 8.0_aarch64 Yes
Operating System redhat enterprise_linux_for_arm_64 9.0_aarch64 Yes
Operating System redhat enterprise_linux_for_arm_64_eus 9.4_aarch64 Yes
Operating System redhat enterprise_linux_for_ibm_z_systems 8.0_s390x Yes
Operating System redhat enterprise_linux_for_ibm_z_systems 9.0_s390x Yes
Operating System redhat enterprise_linux_for_ibm_z_systems_eus 9.4_s390x Yes
Operating System redhat enterprise_linux_for_power_little_endian 9.0_ppc64le Yes
Operating System redhat enterprise_linux_for_power_little_endian_eus 9.4_ppc64le Yes
Operating System redhat enterprise_linux_server_aus 9.4 Yes
Operating System redhat enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 9.2 Yes
Operating System redhat enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 9.4_ppc64le Yes

References