Skip to content

PolarSSL versions prior to v1.1 use the HAVEGE random...

Critical severity Unreviewed Published Apr 22, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instruction, returning 0s or predictable results.

References

Published by the National Vulnerability Database Oct 27, 2021
Published to the GitHub Advisory Database Apr 22, 2022
Last updated Jan 27, 2023

Severity

Critical

EPSS score

0.222%
(61st percentile)

Weaknesses

CVE ID

CVE-2011-4574

GHSA ID

GHSA-69cr-qg65-xgm7

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.