Bug 1889823 (CVE-2020-25657)
| Summary: | CVE-2020-25657 m2crypto: bleichenbacher timing attacks in the RSA decryption API | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Todd Cullum <tcullum> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | carnil, dfediuck, eedri, gholms, mcepl, mgoldboi, michal.skrivanek, mitr, ngompa13, nobody, python-sig, rhel-crypto-maint, sbonazzo, security-response-team, sherold, szidek |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-04-14 16:46:39 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1898305, 1906696 | ||
| Bug Blocks: | 1889511 | ||
|
Description
Todd Cullum
2020-10-20 16:34:40 UTC
Created m2crypto tracking bugs for this issue: Affects: fedora-all [bug 1898305] This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2021:1169 https://access.redhat.com/errata/RHSA-2021:1169 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25657 In the end we have decided to close this with https://gitlab.com/m2crypto/m2crypto/-/merge_requests/273 ... the port of the workaround Cryptography used. |