Tech Support Forum banner
Not open for further replies.
1 - 1 of 1 Posts

· Premium Member
1,615 Posts
Discussion Starter · #1 ·
1. Topic:

Updated OpenSSL packages are available that fix a potential timing-based
attack and a modified Bleichenbacher attack.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - i386
Red Hat Linux 7.0 - i386
Red Hat Linux 7.1 - i386
Red Hat Linux 7.2 - i386, i686, ia64
Red Hat Linux 7.3 - i386, i686
Red Hat Linux 8.0 - i386, i686
Red Hat Linux 9 - i386, i686

3. Problem description:

OpenSSL is a commercial-grade, full-featured, and open source toolkit that
implements Secure Sockets Layer (SSL v2/v3) and Transport Layer
Security (TLS v1) protocols as well as a full-strength general purpose
cryptography library.

Researchers discovered a timing attack on RSA keys. Applications making
use of OpenSSL are generally vulnerable to such an attack, unless RSA
blinding has been turned on. OpenSSL does not use RSA blinding by default
and most applications do not enable RSA blinding.

A local or remote attacker could use this attack to obtain the server's
private key by determining factors using timing differences on (1) the
number of extra reductions during Montgomery reduction, and (2) the use of
different integer multiplication algorithms ("Karatsuba" and normal).

for more info and RPM's upgrade gohere
1 - 1 of 1 Posts
Not open for further replies.