First published: Wed Dec 13 2023(Updated: )
Description: The fix for <a href="https://access.redhat.com/security/cve/CVE-2020-25657">CVE-2020-25657</a> is not addressing the leakage in the RSA decryption. Because of the API design, the fix is generally not believed to be possible to be fully addressed. The issue can be mitigated by using a cryptographic backend that implements implicit rejection (Marvin workaround). Only applications that use RSA decryption with PKCS#1 v1.5 padding are affected. References: <a href="https://gitlab.com/m2crypto/m2crypto/-/issues/342">https://gitlab.com/m2crypto/m2crypto/-/issues/342</a> <a href="https://people.redhat.com/~hkario/marvin/">https://people.redhat.com/~hkario/marvin/</a> <a href="https://github.com/openssl/openssl/pull/13817">https://github.com/openssl/openssl/pull/13817</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | ||
M2Crypto |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2254426 is assessed to be high due to potential RSA decryption leakage.
Currently, there is no complete fix for REDHAT-BUG-2254426, but mitigation strategies should be employed, such as patching and updating to secure versions.
REDHAT-BUG-2254426 affects the OpenSSL and M2Crypto software packages.
Using OpenSSL with REDHAT-BUG-2254426 is risky and should be done with caution until proper mitigations are applied.
The risks of REDHAT-BUG-2254426 include potential data exposure and security breaches due to RSA decryption leakage.