Bug 1301488 (CVE-2015-7744)
| Summary: | CVE-2015-7744 yaSSL, wolfSSL: insufficient hardening of RSA-CRT implementation (Oracle MySQL CPU Jan 2016) | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | abaron, aortega, apevec, ayoung, chrisw, dallan, databases-maint, dciabrin, fdinitto, fweimer, gkotton, hhorak, jdornak, jorton, jschluet, jstanek, lhh, lpeer, markmc, mbayer, mmaslano, mmuzila, rbryant, rohara, sclewis, tdecacqu, yeylon |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | mysql 5.5.46, mysql 5.6.27, mariadb 5.5.46, mariadb 10.1.9, mariadb 10.0.22, wolfSSL 3.6.8, yaSSL 2.3.8 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-02-08 09:28:43 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1301514 | ||
|
Description
Martin Prpič
2016-01-25 09:05:39 UTC
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1301518] Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1301517] Created mariadb-galera tracking bugs for this issue: Affects: fedora-all [bug 1301519] This actually is not a MySQL flaw, but a flaw in embedded yaSSL library. Mitre CVE description is: wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorm (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack. References: https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html https://www.wolfssl.com/wolfSSL/Docs-yassl-changelog.html https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/ Issue was fixed in MySQL by updating embedded yaSSL library to version 2.3.8: https://github.com/mysql/mysql-server/commit/b9768521bdeb1a8069c7b871f4536792b65fd79b MySQL and MariaDB packages as included in Red Hat products do not use embedded yaSSL library and rather use system OpenSSL. Therefore, they were not affected by this issue. |