[Bug 2054090] Re: Implicit rejection of PKCS#1 v1.5 RSA
David Fernandez Gonzalez
2054090 at bugs.launchpad.net
Wed Mar 13 08:50:27 UTC 2024
Trusty would require a significant backport, marking it as won't fix to
prevent possible regressions.
** Changed in: openssl (Ubuntu Trusty)
Assignee: David Fernandez Gonzalez (litios) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2054090
Title:
Implicit rejection of PKCS#1 v1.5 RSA
Status in openssl package in Ubuntu:
New
Status in openssl source package in Trusty:
Won't Fix
Status in openssl source package in Xenial:
Fix Released
Status in openssl source package in Bionic:
Fix Released
Status in openssl source package in Focal:
Fix Released
Status in openssl source package in Jammy:
Fix Released
Status in openssl source package in Mantic:
Fix Released
Status in openssl source package in Noble:
New
Bug description:
OpenSSL 3.2.0 introduced a change on PKCS#1 v1.5 RSA to return random
output instead of an exception when detecting wrong padding
(https://github.com/openssl/openssl/pull/13817).
There are available backports already:
* 3.0 https://gitlab.com/redhat/centos-
stream/rpms/openssl/-/blob/c9s/0120-RSA-PKCS15-implicit-
rejection.patch?ref_type=heads
* 1.1.1 https://gitlab.com/redhat/centos-
stream/rpms/openssl/-/blob/c8s/openssl-1.1.1-pkcs1-implicit-
rejection.patch?ref_type=heads
This change is needed to fix CVE-2023-50782.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2054090/+subscriptions
More information about the foundations-bugs
mailing list