A flaw was found in several RSA-based security protocols. The padding oracle attack countermeasures implementation are vulnerable to microarchitectural and timing side channel attacks. This allows to perform Bleichenbacher-like padding attacks.
Note: This issue is partly fixed by openssl by the patch which was applied for: https://bugzilla.redhat.com/show_bug.cgi?id=1645695 No CVE was assigned by OpenSSL and they have not classified this as a security issue.
External References: http://cat.eyalro.net/
Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1655380] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1655379]
https://github.com/openssl/openssl/pull/7735 is currently being reviewed as a patch for this security flaw.
This vulnerability is out of security support scope for the following products: * Red Hat Enterprise Application Platform 5 * Red Hat JBoss Web Server 3 * Red Hat Enterprise Application Platform 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2304 https://access.redhat.com/errata/RHSA-2019:2304