Name | CVE-2024-0914 |
Description | A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
opencryptoki (PTS) | jessie | 2.3.1+dfsg-3 | vulnerable |
stretch | 3.6.1+dfsg-1 | vulnerable | |
buster | 3.8.1+dfsg-3.1 | vulnerable | |
bullseye, bookworm | 3.8.1+dfsg-3.2 | vulnerable | |
sid, trixie | 3.23.0+dfsg-0.3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
opencryptoki | source | (unstable) | 3.23.0+dfsg-0.1 |
[bookworm] - opencryptoki <no-dsa> (Minor issue)
[bullseye] - opencryptoki <no-dsa> (Minor issue)
[buster] - opencryptoki <postponed> (Minor issue)
https://github.com/opencryptoki/opencryptoki/issues/731
https://github.com/opencryptoki/opencryptoki/pull/732
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/2ea019ee2b09f15724d808382d53baca03403288 (v3.23.0)
https://github.com/opencryptoki/opencryptoki/pull/737
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/7ffc0e135b4d923d686be536aa7bf69405a360a1 (v3.23.0)
Fixed by: https://github.com/opencryptoki/opencryptoki/commit/c26e049bf40d656bc51429bad190b82fbf63f0c7 (v3.23.0)
https://people.redhat.com/~hkario/marvin/