No analysis available yet.
Vendor Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16696 | A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key. |
Sun, 24 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-24T11:28:22.174Z
Reserved: 2024-01-25T22:28:25.811Z
Link: CVE-2024-0914
Updated: 2024-08-01T18:18:18.984Z
Status : Modified
Published: 2024-01-31T05:15:08.137
Modified: 2026-03-24T12:16:11.350
Link: CVE-2024-0914
OpenCVE Enrichment
No data.
EUVD