CVE-2024-0914
5.9MEDIUMA timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext
Published: 1/31/2024Updated: 11/21/2024
Description
A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
AI AnalysisPowered by AI
Affected Products
opencryptoki_projectopencryptoki
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
References
- https://access.redhat.com/errata/RHSA-2024:1239
- https://access.redhat.com/errata/RHSA-2024:1411
- https://access.redhat.com/errata/RHSA-2024:1608
- https://access.redhat.com/errata/RHSA-2024:1856
- https://access.redhat.com/errata/RHSA-2024:1992
- https://access.redhat.com/security/cve/CVE-2024-0914Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2260407Issue TrackingPatch
- https://people.redhat.com/~hkario/marvin/Third Party Advisory
- https://access.redhat.com/errata/RHSA-2024:1239
- https://access.redhat.com/errata/RHSA-2024:1411
- https://access.redhat.com/errata/RHSA-2024:1608
- https://access.redhat.com/errata/RHSA-2024:1856
- https://access.redhat.com/errata/RHSA-2024:1992
- https://access.redhat.com/security/cve/CVE-2024-0914Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2260407Issue TrackingPatch
- https://people.redhat.com/~hkario/marvin/Third Party Advisory