]> git.pld-linux.org Git - packages/openssl.git/commit
- secuirty patch (patch4)
authormisi3k <misi3k@pld-linux.org>
Mon, 17 Mar 2003 18:43:02 +0000 (18:43 +0000)
committercvs2git <feedback@pld-linux.org>
Sun, 24 Jun 2012 12:13:13 +0000 (12:13 +0000)
commitadcb6f76e4153d4737bf3a2d355079a1ec7f1d81
tree40d9099f714a4e9adae743cff66cebb257a56b6b
parent62d94adc0353488b4c3a7a6962bfa14373e28654
- secuirty patch (patch4)

Bug (bugtraq):
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.

Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.

The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.

The performance impact of blinding appears to be small (a few
percent).

This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.

We strongly advise upgrading OpenSSL in all cases, as a precaution.

Changed files:
    openssl.spec -> 1.94
openssl.spec
This page took 0.040792 seconds and 4 git commands to generate.