Reference: https://github.com/weidai11/cryptopp/issues/1247 ----- Crypto++ Issue Report I've verified that the Crypto++ is vulnerable to the Marvin Attack—a timing variant of the well-known Bleichenbacher attack. I've executed the test on ArchLinux, using crypto++ 8.9.0 from the Arch repository. The reproducer is available in the marvin-toolkit repository. It was compiled with a simple g++ -o time_decrypt -lcryptopp time_decrypt.cpp. When executed on AMD Ryzen 5 5600X, I'm able to detect a side-channel signal when performing decryption with PKCS#1 v1.5 padding. The results are statistically significant with just few hundred measurement pairs, but below I'm showing results of a run with 100k repeats to show the size of the side-channel more clearly.
Created cryptopp tracking bugs for this issue: Affects: epel-all [bug 2255128] Affects: fedora-all [bug 2255129]