Implicit rejection of PKCS#1 v1.5 RSA
Bug #2054090 reported by
David Fernandez Gonzalez
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
openssl (Ubuntu) | Status tracked in Noble | |||||
Trusty |
Won't Fix
|
Undecided
|
Unassigned | |||
Xenial |
Fix Released
|
Undecided
|
David Fernandez Gonzalez | |||
Bionic |
Fix Released
|
Undecided
|
David Fernandez Gonzalez | |||
Focal |
Fix Released
|
Undecided
|
David Fernandez Gonzalez | |||
Jammy |
Fix Released
|
Undecided
|
David Fernandez Gonzalez | |||
Mantic |
Fix Released
|
Undecided
|
David Fernandez Gonzalez | |||
Noble |
New
|
Undecided
|
David Fernandez Gonzalez |
Bug Description
OpenSSL 3.2.0 introduced a change on PKCS#1 v1.5 RSA to return random output instead of an exception when detecting wrong padding (https:/
There are available backports already:
This change is needed to fix CVE-2023-50782.
Changed in openssl (Ubuntu): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Noble): | |
assignee: | David Fernandez Gonzalez (litios) → nobody |
Changed in openssl (Ubuntu Bionic): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Focal): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Jammy): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Mantic): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Noble): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Xenial): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
Changed in openssl (Ubuntu Trusty): | |
assignee: | nobody → David Fernandez Gonzalez (litios) |
To post a comment you must log in.
This bug was fixed in the package openssl - 3.0.10-1ubuntu2.3
---------------
openssl (3.0.10-1ubuntu2.3) mantic-security; urgency=medium
* SECURITY UPDATE: Implicit rejection for RSA PKCS#1 (LP: #2054090) patches/ openssl- pkcs1-implicit- rejection. patch: cms/cms_ env.c, evp/ctrl_ params_ translate. c, crypto/ pkcs7/pk7_ doit.c, rsa/rsa_ ossl.c, crypto/ rsa/rsa_ pk1.c, rsa/rsa_ pmeth.c, doc/man1/ openssl- pkeyutl. pod.in, man1/openssl- rsautl. pod.in, doc/man3/ EVP_PKEY_ CTX_ctrl. pod, man3/EVP_ PKEY_decrypt. pod, man3/RSA_ padding_ add_PKCS1_ type_1. pod, man3/RSA_ public_ encrypt. pod, doc/man7/ provider- asym_cipher. pod, crypto/ rsa.h, include/ openssl/ core_names. h, openssl/ rsa.h, /implementation s/asymciphers/ rsa_enc. c and recipes/ 30-test_ evp_data/ evppkey_ rsa_common. txt.
- debian/
Return deterministic random output instead of an error in case
there is a padding error in crypto/
crypto/
crypto/
crypto/
doc/
doc/
doc/
doc/
include/
include/
providers
test/
-- David Fernandez Gonzalez <email address hidden> Wed, 21 Feb 2024 11:45:39 +0100