Bug 2264569 (CVE-2023-46809) - CVE-2023-46809 nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin)
Summary: CVE-2023-46809 nodejs: vulnerable to timing variant of the Bleichenbacher att...
Keywords:
Status: NEW
Alias: CVE-2023-46809
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2264570 2264571 2264572 2264800 2264801 2264802 2264803 2265710
Blocks: 2264565
TreeView+ depends on / blocked
 
Reported: 2024-02-16 17:16 UTC by Robb Gatica
Modified: 2024-04-22 01:09 UTC (History)
4 users (show)

Fixed In Version: node 18.19.1
Doc Type: ---
Doc Text:
A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:1528 0 None None None 2024-03-26 15:30:55 UTC
Red Hat Product Errata RHBA-2024:1587 0 None None None 2024-04-01 20:32:25 UTC
Red Hat Product Errata RHBA-2024:1695 0 None None None 2024-04-08 12:30:22 UTC
Red Hat Product Errata RHBA-2024:1702 0 None None None 2024-04-08 22:46:21 UTC
Red Hat Product Errata RHBA-2024:1709 0 None None None 2024-04-09 11:15:39 UTC
Red Hat Product Errata RHBA-2024:1710 0 None None None 2024-04-09 11:12:44 UTC
Red Hat Product Errata RHBA-2024:1711 0 None None None 2024-04-09 11:21:52 UTC
Red Hat Product Errata RHBA-2024:1712 0 None None None 2024-04-09 11:25:13 UTC
Red Hat Product Errata RHBA-2024:1745 0 None None None 2024-04-10 01:13:40 UTC
Red Hat Product Errata RHBA-2024:1749 0 None None None 2024-04-10 08:48:56 UTC
Red Hat Product Errata RHBA-2024:1774 0 None None None 2024-04-10 19:45:51 UTC
Red Hat Product Errata RHBA-2024:1776 0 None None None 2024-04-11 07:02:52 UTC
Red Hat Product Errata RHSA-2024:1510 0 None None None 2024-03-26 09:22:51 UTC
Red Hat Product Errata RHSA-2024:1687 0 None None None 2024-04-08 09:04:58 UTC
Red Hat Product Errata RHSA-2024:1688 0 None None None 2024-04-08 08:49:47 UTC
Red Hat Product Errata RHSA-2024:1880 0 None None None 2024-04-18 02:08:51 UTC
Red Hat Product Errata RHSA-2024:1932 0 None None None 2024-04-22 01:09:13 UTC

Description Robb Gatica 2024-02-16 17:16:44 UTC
A vulnerability in the privateDecrypt() API of the crypto library, allowed a covert timing side-channel during PKCS#1 v1.5 padding error handling. The vulnerability revealed significant timing differences in decryption for valid and invalid ciphertexts. This poses a serious threat as attackers could remotely exploit the vulnerability to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing Json Web Encryption messages.

This vulnerability affects all users in all active release lines: 18.x, 20.x, and 21.x.

Comment 1 Robb Gatica 2024-02-16 17:23:31 UTC
Created nodejs tracking bugs for this issue:

Affects: epel-all [bug 2264570]


Created nodejs18 tracking bugs for this issue:

Affects: fedora-all [bug 2264571]


Created nodejs20 tracking bugs for this issue:

Affects: fedora-all [bug 2264572]

Comment 3 Sandipan Roy 2024-02-19 04:09:56 UTC
Created nodejs16 tracking bugs for this issue:

Affects: fedora-all [bug 2264802]


Created nodejs:13/nodejs tracking bugs for this issue:

Affects: epel-all [bug 2264800]


Created nodejs:16-epel/nodejs tracking bugs for this issue:

Affects: epel-all [bug 2264801]


Created nodejs:16/nodejs tracking bugs for this issue:

Affects: fedora-all [bug 2264803]

Comment 7 errata-xmlrpc 2024-03-26 09:22:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1510 https://access.redhat.com/errata/RHSA-2024:1510

Comment 8 errata-xmlrpc 2024-04-08 08:49:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:1688 https://access.redhat.com/errata/RHSA-2024:1688

Comment 9 errata-xmlrpc 2024-04-08 09:04:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1687 https://access.redhat.com/errata/RHSA-2024:1687

Comment 10 errata-xmlrpc 2024-04-18 02:08:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:1880 https://access.redhat.com/errata/RHSA-2024:1880

Comment 11 errata-xmlrpc 2024-04-22 01:09:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1932 https://access.redhat.com/errata/RHSA-2024:1932


Note You need to log in before you can comment on or make changes to this bug.