Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-2467

Published: 25 April 2024

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Notes

AuthorNote
mdeslaur
as of 2024-06-27, there is no fix available from the upstream
libcrypt-openssl-rsa-perl developers

Priority

Medium

Status

Package Release Status
libcrypt-openssl-rsa-perl
Launchpad, Ubuntu, Debian
bionic Deferred
(2024-06-27)
focal Deferred
(2024-06-27)
jammy Deferred
(2024-06-27)
mantic Ignored
(end of life, was deferred [2024-06-27])
noble Deferred
(2024-06-27)
trusty Deferred
(2024-06-27)
upstream Needs triage

xenial Deferred
(2024-06-27)