Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <543261CF.6040806@reactos.org>
Date: Mon, 06 Oct 2014 11:33:03 +0200
From: Pierre Schweitzer <pierre@...ctos.org>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: OpenSSL RSA 1024 bits implementation broken?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear all,

There appear to have some noise on the Internet regarding a possible
flaw in the 1024 bits RSA implementation in OpenSSL which would allow
bruteforcing the private key in ~20 minutes.

Does anyone has any information about this? The associated pastebin to
the said information is: http://pastebin.com/D8itq6Ff
Is this serious?

Cheers,
- -- 
Pierre Schweitzer <pierre@...ctos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0EPA
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.