Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-27416 | A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. |
Solution
No solution given by the vendor.
Workaround
This CVE is mitigated (i.e. not exploitable) by using the openssl package with support for implicit rejection shipped in the following RHEL errata: * https://access.redhat.com/errata/RHSA-2024:0208 * https://access.redhat.com/errata/RHSA-2024:0154 * https://access.redhat.com/errata/RHSA-2023:7877 * https://access.redhat.com/errata/RHSA-2024:0500 * https://access.redhat.com/errata/RHBA-2023:6627
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openssl
|
|
CPEs | cpe:2.3:a:redhat:openssl:-:*:*:*:*:*:*:* | |
Vendors & Products |
Redhat openssl
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-06T15:21:11.537Z
Reserved: 2024-03-14T17:31:30.419Z
Link: CVE-2024-2467

Updated: 2024-08-01T19:11:53.605Z

Status : Awaiting Analysis
Published: 2024-04-25T17:15:49.580
Modified: 2024-11-21T09:09:49.040
Link: CVE-2024-2467


No data.