Логотип exploitDog
bind:CVE-2023-6129
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6129

Количество 12

Количество 12

ubuntu логотип

CVE-2023-6129

около 2 лет назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-6129

около 2 лет назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-6129

около 2 лет назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2023-6129

около 2 лет назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-6129

около 2 лет назад

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rj8q-prqp-jwfg

около 2 лет назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-02846

около 2 лет назад

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0172-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0518-1

почти 2 года назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2024:9088

11 месяцев назад

Moderate: edk2 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9088

около 1 года назад

ELSA-2024-9088: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2447

почти 2 года назад

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
2%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.5
2%
Низкий
около 2 лет назад
debian логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
2%
Низкий
около 2 лет назад
github логотип
GHSA-rj8q-prqp-jwfg

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
2%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02846

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
2%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0172-1

Security update for openssl-3

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0518-1

Security update for openssl-3

почти 2 года назад
rocky логотип
RLSA-2024:9088

Moderate: edk2 security update

11 месяцев назад
oracle-oval логотип
ELSA-2024-9088

ELSA-2024-9088: edk2 security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2447

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

почти 2 года назад

Уязвимостей на страницу