Bug 1386584 (CVE-2016-7440)
Summary: | CVE-2016-7440 yaSSL: AES key leak via cache-bank timing side channel attack | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aortega, apevec, ayoung, byte, chrisw, cvsbot-xmlrpc, databases-maint, dciabrin, fdinitto, hhorak, jdornak, jjoyce, jorton, jschluet, jstanek, kbasil, lhh, lpeer, markmc, mbayer, mburns, mmuzila, mschorm, praiskup, rbryant, sclewis, slinaber, srevivo, tdecacqu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | mysql 5.5.53, mysql 5.6.34, mysql 5.7.16, yaSSL 2.4.2, wolfSSL 3.9.10, mariadb 5.5.53, mariadb 10.1.19, mariadb 10.0.28 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-10-19 11:05:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1386598 |
Description
Adam Mariš
2016-10-19 09:21:16 UTC
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1386608] Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1386607] Created mariadb-galera tracking bugs for this issue: Affects: fedora-all [bug 1386609] This is not a MySQL flaw, but a flaw in embedded yaSSL library: https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html https://www.wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Now_Available.html It is mentioned in the respective MySQL release notes as: yaSSL was upgraded to version 2.4.2. This upgrade corrects issues with: Potential AES side channel leaks; ... http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-16.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html Further details form the yaSSL README: https://github.com/mysql/mysql-server/commit/5c6169fb309981b564a17bee31b367a18866d674 yaSSL Release notes, version 2.4.2 (9/22/2016) This release of yaSSL fixes a medium security vulnerability. A fix for potential AES side channel leaks is included that a local user monitoring the same CPU core cache could exploit. VM users, hyper-threading users, and users where potential attackers have access to the CPU cache will need to update if they utilize AES. MySQL and MariaDB packages included in Red Hat products are built against system OpenSSL packages. They are not using embedded yaSSL, and are therefore not affected by this issue. |