CVE-2025-49824

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-49824
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-49824.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-49824
Aliases
  • GHSA-2xf4-hg9q-m58q
Published
2025-06-17T21:15:40Z
Modified
2025-06-18T14:43:47.646678Z
Summary
[none]
Details

conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travisencryptbinstar_token implementation in the conda-smithy package has been identified as vulnerable to an Oracle Padding Attack. This vulnerability results from the use of an outdated and insecure padding scheme during RSA encryption. A malicious actor with access to an oracle system can exploit this flaw by iteratively submitting modified ciphertexts and analyzing responses to infer the plaintext without possessing the private key. This issue has been patched in version 3.47.1.

References

Affected packages

Git / github.com/conda-forge/conda-smithy

Affected ranges

Type
GIT
Repo
https://github.com/conda-forge/conda-smithy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.10.0
v0.10.1
v0.10.2
v0.10.3
v0.10.4
v0.10.5
v0.2
v0.3
v0.3.1
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.5.1
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.7.2
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.9.0
v0.9.1
v0.9.2

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.6.0
v1.6.1
v1.7.0

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.3.1
v2.3.2
v2.3.3
v2.4.0
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.4.5

v3.*

v3.0.0
v3.0.0.rc1
v3.0.0.rc2
v3.0.0rc3
v3.0.0rc4
v3.1.0
v3.1.1
v3.1.10
v3.1.11
v3.1.12
v3.1.13
v3.1.2
v3.1.3
v3.1.4
v3.1.5
v3.1.6
v3.1.7
v3.1.8
v3.1.9
v3.10.0
v3.10.1
v3.10.2
v3.10.3
v3.11.0
v3.12
v3.13.0
v3.14.0
v3.14.1
v3.14.2
v3.14.3
v3.15.0
v3.15.1
v3.16.0
v3.16.1
v3.16.2
v3.17.0
v3.17.1
v3.17.2
v3.18.0
v3.19.0
v3.2.0
v3.2.1
v3.2.10
v3.2.11
v3.2.12
v3.2.13
v3.2.14
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.2.7
v3.2.8
v3.2.9
v3.21.0
v3.21.1
v3.21.2
v3.21.3
v3.22.0
v3.22.1
v3.23.0
v3.23.1
v3.24.0
v3.24.1
v3.25.0
v3.25.1
v3.26.0
v3.26.1
v3.26.2
v3.26.3
v3.27.0
v3.27.1
v3.28.0
v3.29.0
v3.3.0
v3.3.1
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.3.6
v3.3.7
v3.30.0
v3.30.1
v3.30.2
v3.30.3
v3.30.4
v3.31.0
v3.31.1
v3.32.0
v3.33.0
v3.34.0
v3.34.1
v3.35.0
v3.35.1
v3.36.0
v3.36.1
v3.36.2
v3.37.0
v3.37.1
v3.37.2
v3.38.0
v3.39.0
v3.39.1
v3.4.0
v3.4.1
v3.4.2
v3.4.3
v3.4.4
v3.4.5
v3.4.6
v3.4.7
v3.4.8
v3.40.0
v3.40.1
v3.41.0
v3.41.1
v3.42.0
v3.42.2
v3.43.0
v3.43.1
v3.43.2
v3.44.0
v3.44.1
v3.44.2
v3.44.3
v3.44.4
v3.44.6
v3.44.7
v3.44.8
v3.44.9
v3.45.0
v3.45.1
v3.45.2
v3.45.3
v3.45.4
v3.46.0
v3.46.1
v3.47.0
v3.5.0
v3.6.0
v3.6.1
v3.6.10
v3.6.11
v3.6.12
v3.6.13
v3.6.14
v3.6.15
v3.6.16
v3.6.17
v3.6.2
v3.6.3
v3.6.4
v3.6.5
v3.6.6
v3.6.7
v3.6.8
v3.6.9
v3.7.0
v3.7.1
v3.7.10
v3.7.2
v3.7.3
v3.7.4
v3.7.6
v3.7.7
v3.7.8
v3.7.9
v3.8.0
v3.8.1
v3.8.2
v3.8.3
v3.8.4
v3.8.5
v3.8.6
v3.9.0

vv3.*

vv3.10.0
vv3.14.0