A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
{
"binaries": [
{
"binary_name": "libopencryptoki-dev",
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2"
},
{
"binary_name": "libopencryptoki0",
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2"
},
{
"binary_name": "opencryptoki",
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2"
}
]
}{
"binaries": [
{
"binary_name": "libopencryptoki-dev",
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1"
},
{
"binary_name": "libopencryptoki0",
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1"
},
{
"binary_name": "opencryptoki",
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1"
}
]
}