-
-
Notifications
You must be signed in to change notification settings - Fork 901
cleanup RSA PKCS#1 v1.5 signature verification (CVE-2021-30130) #1635
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. References https://nvd.nist.gov/vuln/detail/CVE-2021-30130 phpseclib/phpseclib#1635 https://github.com/phpseclib/phpseclib/releases/tag/2.0.31 https://github.com/phpseclib/phpseclib/releases/tag/3.0.7
Is this going to be fixed in the version 2.0 branch? We're using version 2.0.4 over at https://github.com/friendica/friendica-addons and I would prefer not have to either downgrade to version 2.0.31 or figure out if we can use version 3.0.7. |
First, the fix is in the 2.0 branch. The release that contains this has been tagged as 2.0.31, which is not a downgrade from 2.0.4 - it's an upgrade. Second, the only vulnerabilities are in the 3.0 branch. Quoting the disclosure (which I can send to you if you'd like; I kinda wish the author would make it public but whatever):
So to sum it up, there were five issues total.
In other words, v2.0 does not have a vulnerability, according to the original paper. |
Thank you so much for the answer, for some reason I read 2.0.31 as 2.0.3.1 which would have made it a downgrade from 2.0.4. Sorry about the confusion. |
Altho phpseclib isn't mentioned in it, https://myweb.uiowa.edu/yahyazadeh/files/pkcs1v1_5-ndss19.pdf talks about the kinds of issues that this PR addresses. The reporter of these issues is one of the authors of that paper |
No description provided.