Slackware: mod_ssl timing based attack vulnerability
Posted by LinuxSecurity.com Team   
Slackware This version provides RSA blinding by default which prevents an extended timing analysis from revealing details of the secret key to an attacker.

[slackware-security]  mod_ssl RSA blinding fixes (SSA:2003-141-05)

An upgrade for mod_ssl to version 2.8.14_1.3.27 is now available.
This version provides RSA blinding by default which prevents an
extended timing analysis from revealing details of the secret key
to an attacker.  Note that this problem was already fixed within
OpenSSL, so this is a "double fix".  With this package, mod_ssl
is secured even if OpenSSL is not.

We recommend sites using mod_ssl upgrade to this new package.


Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue May 20 20:13:09 PDT 2003
patches/packages/mod_ssl-2.8.14_1.3.27-i386-1.tgz:  Upgraded to
  mod_ssl-2.8.14_1.3.27.  Includes RSA blinding fixes.
  (* Security fix *)
+--------------------------+



WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated package for Slackware 9.0: 
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/mod_ssl-2.8.14_1.3.27-i386-1.tgz



MD5 SIGNATURES:
+-------------+

Slackware 9.0 package:
2888ecec5e2116be81b5295fc477869b  mod_ssl-2.8.14_1.3.27-i386-1.tgz



INSTALLATION INSTRUCTIONS:
+------------------------+

First, shut down your web server:
# apachectl stop

Then upgrade using upgradepkg (as root):
upgradepkg mod_ssl-2.8.14_1.3.27-i386-1.tgz

Finally, restart secure web services:
# apachectl startssl



+-----+

Slackware Linux Security Team 
http://slackware.com/gpg-key
security@slackware.com