Description of problem: AES key wrapping mode does not confirm to RFC 5649 because of incorrect padding. This causes interoperability problems and can cause one byte corruption in a process using CRYPTO_128_wrap_pad() call. Version-Release number of selected component (if applicable): openssl-1.0.1k-1 How reproducible: 100 % Steps to Reproduce: 1. Wrap a plaintext with length % 8 == 0. Actual results: Output ciphertext is one block longer than it should be. Expected results: Output should conform to RFC 5649 section 4.1. Extended Key Wrapping Process. Additional info: Bogus line: https://github.com/openssl/openssl/blob/master/crypto/modes/wrap128.c#L234 Fix: https://github.com/spacekpe/openssl/commit/69a37391f4a82855246fd86ddfb0c6bb47c36855
It seems that openssl-1.0.1k-6.fc21 package contains the fix.