Description: A timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts was discovered in the opencryptoki package. This side-channel can be used to perform RSA ciphertext decryption or signing without access to the private key. To achieve a successful decryption the attack would need to send a large amount of specifically crafted messages to a service that uses the vulnerable API. Fixed in: No fixed-in version yet, but a new release is expected in the next 3 weeks or so. Patches are already merged though. References: https://github.com/opencryptoki/opencryptoki/issues/731 https://github.com/opencryptoki/opencryptoki/pull/737 https://github.com/opencryptoki/opencryptoki/commit/2ea019ee2b09f15724d808382d53baca03403288 https://github.com/opencryptoki/opencryptoki/commit/7ffc0e135b4d923d686be536aa7bf69405a360a1 https://github.com/opencryptoki/opencryptoki/commit/c26e049bf40d656bc51429bad190b82fbf63f0c7 https://people.redhat.com/~hkario/marvin/
Created openCryptoki tracking bugs for this issue: Affects: fedora-all [bug 2260408]
This vulnerability in opencryptoki, enabling RSA ciphertext decryption or signing without the private key, is moderate due to the significant effort needed to exploit it, including sending a large number of meticulously crafted messages to a vulnerable API-utilizing service and a precise timing control.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1239 https://access.redhat.com/errata/RHSA-2024:1239
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:1411 https://access.redhat.com/errata/RHSA-2024:1411
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:1608 https://access.redhat.com/errata/RHSA-2024:1608
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1856 https://access.redhat.com/errata/RHSA-2024:1856
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:1992 https://access.redhat.com/errata/RHSA-2024:1992