No analysis available yet.
Vendor Workaround
This CVE is mitigated (i.e. not exploitable) by using the openssl package with support for implicit rejection shipped in the following RHEL errata: * https://access.redhat.com/errata/RHSA-2024:0208 * https://access.redhat.com/errata/RHSA-2024:0154 * https://access.redhat.com/errata/RHSA-2023:7877 * https://access.redhat.com/errata/RHSA-2024:0500 * https://access.redhat.com/errata/RHBA-2023:6627
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27416 | A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. |
Wed, 18 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openssl
|
|
| CPEs | cpe:2.3:a:redhat:openssl:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Redhat openssl
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-25T19:31:17.530Z
Reserved: 2024-03-14T17:31:30.419Z
Link: CVE-2024-2467
Updated: 2024-08-01T19:11:53.605Z
Status : Awaiting Analysis
Published: 2024-04-25T17:15:49.580
Modified: 2026-02-25T20:17:20.923
Link: CVE-2024-2467
OpenCVE Enrichment
No data.
EUVD