Bug 2063378
| Summary: | Sending incorrect mechanism params for RSA OAEP operations | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | space88man <shihping.chan> |
| Component: | openssl-pkcs11 | Assignee: | Jakub Jelen <jjelen> |
| Status: | ASSIGNED --- | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | low | ||
| Version: | 9.4 | CC: | ansasaki |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | 9.4 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | Bug | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
space88man
2022-03-12 00:22:10 UTC
Verified that softhsm2 accepts C_DecryptInit calls with source=0
33: C_DecryptInit
2022-03-12 10:22:49.721
[in] hSession = 0x1
pMechanism->type=CKM_RSA_PKCS_OAEP
pMechanism->pParameter->hashAlg=CKM_SHA_1
pMechanism->pParameter->mgf=CKG_MGF1_SHA1
pMechanism->pParameter->source=0
[out] pSourceData[ulSourceDalaLen] NULL [size : 0x0 (0)]
[in] hKey = 0x2
Returned: 0 CKR_OK
34: C_Decrypt
2022-03-12 10:22:49.721
[in] hSession = 0x1
[in] pEncryptedData[ulEncryptedDataLen] 0000564542b5cc20 / 256
00000000 56 C5 1D 72 84 24 97 ED 87 B1 8B 26 C2 FF 3E 26 V..r.$.....&..>&
00000010 83 A1 DD 9E A4 3E EE 38 74 C1 C3 E4 B1 FE 1F 8B .....>.8t.......
00000020 07 1D AD 40 8D FB 31 65 F7 CA 1E 39 44 38 E0 C0 ...@..1e...9D8..
00000030 40 57 49 F9 78 BD DA EB E0 51 EC F3 64 32 79 31 @WI.x....Q..d2y1
Thank you for the PR and a bug report. As we will have the issue merged upstream, I will look if and when we can update it in RHEL. Also, please open a customer support case with Red Hat support to make sure the issue is properly prioritized. Without that, we can not guarantee the RHEL update. Moving to RHEL 9 as we do not plan to do any other non-critical bugfixes in RHEL8. |