Improper Handling of Exceptional Conditions Affecting aactl package, versions <0.4.12-r7


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-AACTL-6420393
  • published9 Mar 2024
  • disclosed10 May 2023

Introduced: 10 May 2023

CVE-2023-1732  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

Upgrade Wolfi aactl to version 0.4.12-r7 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream aactl package and not the aactl package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

CVSS Scores

version 3.1