Using crafted public RSA keys which are not compliant with SP 800-56B can cause a small memory leak when encrypting and verifying payloads.
An attacker can leverage this flaw to gradually erode available memory to the point where the host crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
{ "nvd_published_at": "2024-03-21T13:00:08Z", "cwe_ids": [ "CWE-400", "CWE-401" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-03-20T18:10:36Z" }