]> git.pld-linux.org Git - packages/openssl.git/commit
- secuirty patch
authormisi3k <misi3k@pld-linux.org>
Mon, 17 Mar 2003 18:44:20 +0000 (18:44 +0000)
committercvs2git <feedback@pld-linux.org>
Sun, 24 Jun 2012 12:13:13 +0000 (12:13 +0000)
commit98b4a6cf42c4499c1ac0612ecd68b959581aab05
tree15bb7f8f885e2d71e61774ae8a4352e142dd7371
parentadcb6f76e4153d4737bf3a2d355079a1ec7f1d81
- secuirty patch
Bug (bugtraq):
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.

Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.

The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.

The performance impact of blinding appears to be small (a few
percent).

This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.

We strongly advise upgrading OpenSSL in all cases, as a precaution.

Changed files:
    openssl-sec3.patch -> 1.1
openssl-sec3.patch [new file with mode: 0644]
This page took 0.140734 seconds and 4 git commands to generate.