Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-25189

Опубликовано: 08 фев. 2024
Источник: debian
EPSS Низкий

Описание

libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libjwtfixed1.17.0-1experimentalpackage
libjwtfixed1.17.0-2package
libjwtfixed1.10.2-1+deb12u1bookwormpackage
libjwtfixed1.10.2-1+deb11u1bullseyepackage

Примечания

  • https://github.com/P3ngu1nW/CVE_Request/blob/main/benmcollins%3Alibjwt.md

  • https://github.com/benmcollins/libjwt/commit/f73bac57c5bece16ac24f1a70022aa34355fc1bf (v1.17.0)

  • https://github.com/benmcollins/libjwt/commit/a5d61ef4f1b383876e0a78534383f38159471fd6 (v1.17.0)

EPSS

Процентиль: 24%
0.00083
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.

CVSS3: 9.8
nvd
почти 2 года назад

libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.

CVSS3: 9.8
github
почти 2 года назад

libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.

EPSS

Процентиль: 24%
0.00083
Низкий