First published: Tue Oct 20 2020(Updated: )
All released versions of m2crypto are vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext. Upstream issue: <a href="https://gitlab.com/m2crypto/m2crypto/-/issues/285">https://gitlab.com/m2crypto/m2crypto/-/issues/285</a>
Affected Software | Affected Version | How to fix |
---|---|---|
M2Crypto | <= |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1889823 is categorized as high due to the potential for timing attacks on RSA decryption.
To fix REDHAT-BUG-1889823, you should update to the latest version of M2Crypto that addresses the timing attack vulnerability.
All released versions of M2Crypto are affected by REDHAT-BUG-1889823.
REDHAT-BUG-1889823 involves Bleichenbacher timing attacks on RSA decryption.
Currently, the recommended approach is to update M2Crypto as there is no specific workaround for REDHAT-BUG-1889823.