A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
{
    "binaries": [
        {
            "binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
            "binary_name": "libopencryptoki-dev"
        },
        {
            "binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
            "binary_name": "libopencryptoki0"
        },
        {
            "binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
            "binary_name": "opencryptoki"
        }
    ]
}{
    "binaries": [
        {
            "binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
            "binary_name": "libopencryptoki-dev"
        },
        {
            "binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
            "binary_name": "libopencryptoki0"
        },
        {
            "binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
            "binary_name": "opencryptoki"
        }
    ]
}