Bug 1331426 (CVE-2016-2107)
Summary: | CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | akjain, asanders, bbaranow, bmaxwell, bradler, bwoodcock, cdewolf, csutherl, dahjelle.redhat.com, dandread, darran.lofthouse, devin, dosoudil, erik-fedora, freiheit, gzaronik, hkario, huwang, jaeshin, jawilson, jclere, jdoyle, jonas.schwabe, ktietz, leho, lgao, marcandre.lureau, mbabacek, mdshaikh, mturk, myarboro, pdwyer, pgier, psakar, pslavice, redhat-bugzilla, rjones, rnetuka, rsvoboda, ryan.parman, sardella, security-response-team, slawomir, tmraz, twalsh, unixi, vtunka, weli, yozone | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
See Also: | https://issues.redhat.com/browse/JBCS-81 | ||||||
Whiteboard: | |||||||
Fixed In Version: | openssl 1.0.1t, openssl 1.0.2h | Doc Type: | Bug Fix | ||||
Doc Text: |
It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2017-02-22 12:29:07 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1331569, 1331570, 1331865, 1331866, 1332407, 1332588, 1332589, 1332590, 1332591, 1366994 | ||||||
Bug Blocks: | 1330106, 1395463 | ||||||
Attachments: |
|
Description
Tomas Hoger
2016-04-28 13:46:53 UTC
Acknowledgments: Name: the OpenSSL project Upstream: Juraj Somorovsky Created attachment 1151920 [details]
OpenSSL upstream fix
External References: https://openssl.org/news/secadv/20160503.txt Created openssl101e tracking bugs for this issue: Affects: epel-5 [bug 1332590] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1332588] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1332589] Affects: epel-7 [bug 1332591] Upstream commit: 1.0.1 https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4159f311671cf3bac03815e5de44681eb758304a 1.0.2 https://git.openssl.org/?p=openssl.git;a=commitdiff;h=68595c0c2886e7942a14f98c17a55a88afb6c292 openssl-1.0.2h-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. Detailed write-up from the original reporter: http://web-in-security.blogspot.com/2016/05/curious-padding-oracle-in-openssl-cve.html Detailed independent analysis of the issue: https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ openssl-1.0.2h-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0722 https://rhn.redhat.com/errata/RHSA-2016-0722.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0996 https://rhn.redhat.com/errata/RHSA-2016-0996.html openssl-1.0.1k-15.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. openssl101e-1.0.1e-8.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. Hello Team, Customer is requesting for backporting of this fix of openssl into 6.7 (EUS). Please check This issue has been addressed in the following products: Red Hat Enterprise Linux 6.7 Extended Update Support Via RHSA-2016:2073 https://rhn.redhat.com/errata/RHSA-2016-2073.html (In reply to errata-xmlrpc from comment #22) > This issue has been addressed in the following products: > > Red Hat Enterprise Linux 6.7 Extended Update Support > > Via RHSA-2016:2073 https://rhn.redhat.com/errata/RHSA-2016-2073.html This makes this bugzilla appear to have been addressed, but the status is still "NEW". I've got a customer that confirmed this patch is in their RHEL6.7 EUS patches that they received via the normal RHN stream. Should this bug have been closed by now? This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html |