openssl/include
Dmitry Belyavskiy b1892d21f8 Fix Timing Oracle in RSA decryption
A timing based side channel exists in the OpenSSL RSA Decryption
implementation which could be sufficient to recover a plaintext across
a network in a Bleichenbacher style attack. To achieve a successful
decryption an attacker would have to be able to send a very large number
of trial messages for decryption. The vulnerability affects all RSA
padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.

Patch written by Dmitry Belyavsky and Hubert Kario

CVE-2022-4304

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
2023-02-07 17:05:10 +01:00
..
crypto Fix Timing Oracle in RSA decryption 2023-02-07 17:05:10 +01:00
internal QUIC Probes Support: Minor tweaks 2023-01-30 09:44:59 +01:00
openssl Implement BIO_s_dgram_mem() reusing the BIO_s_dgram_pair() code 2023-01-27 16:11:38 +01:00