Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.8
openCryptoki Library on Linux and AIX: Out-of-Bounds Reads Possible
CVE-2026-40253
Summary
The openCryptoki library, used for Linux and AIX, has a vulnerability in its decoding functions that can allow an attacker to access sensitive data by sending malformed files. This can happen when using certain PKCS#11 operations or loading tokens from disk. To fix this, update to version 3.27.0 or later, which includes a patch.
Original title
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but...
Original description
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but no buffer length parameter, and trust attacker-controlled BER length fields without validating them against actual buffer boundaries. All primitive decoders are affected: ber_decode_INTEGER, ber_decode_SEQUENCE, ber_decode_OCTET_STRING, ber_decode_BIT_STRING, and ber_decode_CHOICE. Additionally, ber_decode_INTEGER can produce integer underflows when the encoded length is zero. An attacker supplying a malformed BER-encoded cryptographic object through PKCS#11 operations such as C_CreateObject or C_UnwrapKey, token loading from disk, or remote backend communication can trigger out-of-bounds reads. This affects all token backends (Soft, ICA, CCA, TPM, EP11, ICSF) since the vulnerable code is in the shared common library. A patch is available thorugh commit ed378f463ef73364c89feb0fc923f4dc867332a3.
nvd CVSS3.1
6.8
Vulnerability type
CWE-125
Out-of-bounds Read
Published: 16 Apr 2026 · Updated: 17 Apr 2026 · First seen: 16 Apr 2026