[Pkg-openssl-devel] Bug#1053180: openssl: Make RSA decryption API safe to use with PKCS#1 v1.5 padding (Marvin/Bleichenbacher)

Matt Taggart matt at lackof.org
Thu Sep 28 20:58:21 BST 2023


Package: openssl
Version: 3.0.11-1

Recently "The Marvin Attack" aka Bleichenbacher timing attack has been 
in the news again:
   https://people.redhat.com/~hkario/marvin/

CVE-2022-4304 was already fixed in all but buster:
   https://security-tracker.debian.org/tracker/CVE-2022-4304

But the page references an API level pull request upstream:
   https://github.com/openssl/openssl/pull/13817

and there is also this corresponding issue:
   https://github.com/openssl/openssl/issues/13421

The history on that issue is long and complicated and it's not clear to 
me if this has been fixed and if so on what releases? Maybe someone with 
more knowledge of this can make more sense of it?

If it hasn't been fixed this bug can track it.
If it has been fixed it would be nice to have something in changelog or 
NEWS mentioning it.

But separate from that, it would be good to move away from this old 
potentially hazardous method. Is there some way of determining what 
software in Debian might be using this (via openssl API) so those things 
could get fixed as well?

Not much can be done about non-Debian software running on Debian, but we 
want old software to continue to function (at least for a while, 
eventually some sort of logged warning might be nice).

Thanks,

-- 
Matt Taggart
matt at lackof.org



More information about the Pkg-openssl-devel mailing list