Bug 2122409

Summary: pki-tomcat/kra unable to decrypt when using RSA-OAEP padding in RHEL9 with FIPS enabled
Product: Red Hat Enterprise Linux 9 Reporter: Jack Magne <jmagne>
Component: pki-coreAssignee: Marco Fargetta <mfargett>
Status: CLOSED ERRATA QA Contact: idm-cs-qe-bugs
Severity: high Docs Contact:
Priority: urgent    
Version: 9.1CC: aakkiang, ckelley, edewata, ftrivino, idm-cs-qe-bugs, jmagne, lmiksik, mfargett, mharmsen, pcech, pgm-rhel-tools, pvlasin, rhcs-maint, skhandel, sumenon
Target Milestone: rcKeywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: pki-core-11.3.0-1.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 2100807
: 2123378 2123513 (view as bug list) Environment:
Last Closed: 2023-05-09 07:43:41 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2100807, 2184514, 2184525    
Bug Blocks: 2089907, 2122919, 2123378, 2123513    

Comment 11 Petr Čech 2022-11-21 09:09:52 UTC
*** Bug 2123378 has been marked as a duplicate of this bug. ***

Comment 23 errata-xmlrpc 2023-05-09 07:43:41 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: pki-core security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:2293