CVE-2024-30171: Bouncy Castle affected by timing side-channel for RSA key exchange ("The Marvin Attack")
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
References
- github.com/advisories/GHSA-v435-xc8x-wvr9
- github.com/bcgit/bc-csharp/commit/c984b8bfd8544dfc55dba91a02cbbbb9c580c217
- github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030171
- github.com/bcgit/bc-java/commit/d7d5e735abd64bf0f413f54fd9e495fc02400fb0
- github.com/bcgit/bc-java/commit/e0569dcb1dea9d421d84fc4c5c5688fe101afa2d
- github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030171
- nvd.nist.gov/vuln/detail/CVE-2024-30171
- www.bouncycastle.org/latest_releases.html
Detect and mitigate CVE-2024-30171 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →