First published: Wed Oct 21 2020(Updated: )
A flaw was found in python-rsa, where it is vulnerable to Bleichenbacher timing attacks. This flaw allows an attacker, via the RSA decryption API, to decrypt parts of the ciphertext encrypted with RSA. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-rsa | <0:4.8-1.el8c | 0:4.8-1.el8c |
redhat/python-rsa | <0:4.5-3.el7 | 0:4.5-3.el7 |
redhat/python-rsa | <0:4.7-1.el8 | 0:4.7-1.el8 |
pip/rsa | >=2.1<4.7 | 4.7 |
python3-rfc3339 | >=2.1<4.7 | |
Red Hat OpenStack Platform | =13.0 | |
Red Hat OpenStack Platform | =16.0 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 | |
Red Hat Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2020-25658 is high, primarily affecting confidentiality.
To fix CVE-2020-25658, upgrade python-rsa to version 4.8 or later.
CVE-2020-25658 affects python-rsa versions prior to 4.8, including versions 4.7 and below.
CVE-2020-25658 enables Bleichenbacher timing attacks which can decrypt parts of RSA encrypted ciphertext.
CVE-2020-25658 affects python-rsa across various platforms including Red Hat OpenStack and Fedora.