The modular exponentiation operation in RSA uses a sliding window algorithm, with a memory access pattern that depends on the bits of the secret key. Exponent blinding is used as a counter-measure: it prevents an attacker from correlating informations gathered on successive operation, but researchers found a way to recover enough information by observing a single operation, therefore by-passing this counter-measure. References: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-07-1
Created mbedtls tracking bugs for this issue: Affects: epel-all [bug 1981512] Affects: fedora-all [bug 1981511]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.