Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Chrome | * | 63.0.3239.84 (excluding) | |
| Red Hat Enterprise Linux 6 Supplementary | RedHat | chromium-browser-0:63.0.3239.84-1.el6_9 | * |
| Chromium-browser | Ubuntu | artful | * |
| Chromium-browser | Ubuntu | bionic | * |
| Chromium-browser | Ubuntu | cosmic | * |
| Chromium-browser | Ubuntu | devel | * |
| Chromium-browser | Ubuntu | trusty | * |
| Chromium-browser | Ubuntu | upstream | * |
| Chromium-browser | Ubuntu | xenial | * |
| Chromium-browser | Ubuntu | zesty | * |
| Oxide-qt | Ubuntu | artful | * |
| Oxide-qt | Ubuntu | esm-infra/xenial | * |
| Oxide-qt | Ubuntu | trusty | * |
| Oxide-qt | Ubuntu | xenial | * |
| Oxide-qt | Ubuntu | zesty | * |