A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
{
"binaries": [
{
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
"binary_name": "libopencryptoki-dev"
},
{
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
"binary_name": "libopencryptoki0"
},
{
"binary_version": "3.17.0+dfsg+20220202.b40982e-0ubuntu1.2",
"binary_name": "opencryptoki"
}
]
}{
"binaries": [
{
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
"binary_name": "libopencryptoki-dev"
},
{
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
"binary_name": "libopencryptoki0"
},
{
"binary_version": "3.24.0+git20250128.0462717+dfsg-0ubuntu1",
"binary_name": "opencryptoki"
}
]
}