Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2023-30590: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2023-30590: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/27/2023
Created
06/28/2023
Added
06/28/2023
Modified
12/06/2023

Description

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values". The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.

Solution(s)

  • suse-upgrade-corepack14
  • suse-upgrade-corepack16
  • suse-upgrade-corepack18
  • suse-upgrade-nodejs12
  • suse-upgrade-nodejs12-devel
  • suse-upgrade-nodejs12-docs
  • suse-upgrade-nodejs14
  • suse-upgrade-nodejs14-devel
  • suse-upgrade-nodejs14-docs
  • suse-upgrade-nodejs16
  • suse-upgrade-nodejs16-devel
  • suse-upgrade-nodejs16-docs
  • suse-upgrade-nodejs18
  • suse-upgrade-nodejs18-devel
  • suse-upgrade-nodejs18-docs
  • suse-upgrade-npm12
  • suse-upgrade-npm14
  • suse-upgrade-npm16
  • suse-upgrade-npm18

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;