A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0966 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0967 | third party advisory vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-5992 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2248685 | issue tracking |
https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992 | vendor advisory |
https://www.usenix.org/system/files/usenixsecurity24-shagam.pdf | exploit technical description |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/ |