First published: Wed Nov 22 2023(Updated: )
A security vulnerability has been identified in the pkcs11-provider, which is associated with Public-Key Cryptography Standards (PKCS#11). If exploited successfully, this vulnerability could result in a Bleichenbacher-like security flaw, potentially enabling a side-channel attack on PKCS#1 1.5 decryption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pkcs11-provider | <0.2 | 0.2 |
Latchset Pkcs11-provider | =0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6258 has been classified as a moderate severity vulnerability due to potential security implications related to side-channel attacks.
To mitigate CVE-2023-6258, update the pkcs11-provider to version 0.2 or later, ensuring you are no longer using affected versions.
CVE-2023-6258 affects pkcs11-provider versions up to, but not including, 0.2 from Red Hat and version 0.1 from Latchset.
CVE-2023-6258 is associated with a Bleichenbacher-like vulnerability that may allow for side-channel attacks.
Pkcs11-provider is a software package involved in cryptographic operations that has been identified to have the vulnerability CVE-2023-6258.