File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 2424 (CVE-2019-1549)
2525 [Matthias St. Pierre]
2626
27- *) Fixed a padding oracle in PKCS7_decrypt() and CMS_decrypt(). In situations
28- where an attacker receives automated notification of the success or failure
29- of a decryption attempt an attacker, after sending a very large number of
30- messages to be decrypted, can recover a CMS/PKCS7 transported encryption
31- key or decrypt any RSA encrypted message that was encrypted with the public
32- RSA key, using a Bleichenbacher padding oracle attack. Applications are not
33- affected if they use a certificate together with the private RSA key to the
34- CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info
35- to decrypt.
36- (CVE-2019-1563)
37- [Bernd Edlinger]
38-
3927 *) For built-in EC curves, ensure an EC_GROUP built from the curve name is
4028 used even when parsing explicit parameters, when loading a serialized key
4129 or calling `EC_GROUP_new_from_ecpkparameters()`/
6654 certifiate is not given and all recipientInfo are tried out.
6755 The old behaviour can be re-enabled in the CMS code by setting the
6856 CMS_DEBUG_DECRYPT flag.
57+ (CVE-2019-1563)
6958 [Bernd Edlinger]
7059
7160 *) Early start up entropy quality from the DEVRANDOM seed source has been
Original file line number Diff line number Diff line change 88 Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [under development]
99
1010 o Fixed a fork protection issue (CVE-2019-1549)
11- o Fixed a padding oracle in PKCS7_decrypt() and CMS_decrypt()
11+ o Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
1212 (CVE-2019-1563)
1313 o For built-in EC curves, ensure an EC_GROUP built from the curve name is
1414 used even when parsing explicit parameters
You can’t perform that action at this time.
0 commit comments