CVE-2024-0914

NameCVE-2024-0914
DescriptionA timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
opencryptoki (PTS)jessie2.3.1+dfsg-3vulnerable
stretch3.6.1+dfsg-1vulnerable
buster3.8.1+dfsg-3.1vulnerable
bullseye, bookworm3.8.1+dfsg-3.2vulnerable
sid, trixie3.23.0+dfsg-0.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opencryptokisource(unstable)3.23.0+dfsg-0.1

Notes

[bookworm] - opencryptoki <no-dsa> (Minor issue)
[bullseye] - opencryptoki <no-dsa> (Minor issue)
[buster] - opencryptoki <postponed> (Minor issue)
https://github.com/opencryptoki/opencryptoki/issues/731
https://github.com/opencryptoki/opencryptoki/pull/732
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/2ea019ee2b09f15724d808382d53baca03403288 (v3.23.0)
https://github.com/opencryptoki/opencryptoki/pull/737
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/7ffc0e135b4d923d686be536aa7bf69405a360a1 (v3.23.0)
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/c26e049bf40d656bc51429bad190b82fbf63f0c7 (v3.23.0)
https://people.redhat.com/~hkario/marvin/

Search for package or bug name: Reporting problems