Bug 2164487 (CVE-2022-4304)

Summary: CVE-2022-4304 openssl: timing attack in RSA Decryption implementation
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acrosby, adudiak, bdettelb, berrange, bootloader-eng-team, caswilli, christopher.voltz, cllang, csutherl, dbelyavs, ddepaula, dffrench, dfreiber, dhalasz, dkuc, drieden, fjansen, gzaronik, hbraun, hkataria, ikanias, jary, jburrell, jclere, jferlan, jkoehler, jmitchel, jtanner, jwon, kaycoth, kraxel, kshier, kyoshida, micjohns, mmadzin, mturk, ngough, nweather, pbonzini, peholase, pjindal, plodge, rgodfrey, rh-spice-bugs, rogbas, rravi, security-response-team, stcannon, sthirugn, szappis, tfister, tohughes, virt-maint, vkrizan, vkumar, vmugicag, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-03-22 14:03:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2164541, 2164542, 2164543, 2164545, 2164546, 2164547, 2164548, 2164549, 2164550, 2164552, 2164553, 2164554, 2164555, 2166345, 2167914, 2167915, 2167917, 2167918, 2167919, 2167920, 2167921, 2167922, 2167923, 2167924, 2167925, 2167926, 2167927, 2167928, 2167929, 2167930, 2191726, 2191727, 2191728, 2208594, 2208595    
Bug Blocks: 2164384    

Description Marian Rehak 2023-01-25 15:18:27 UTC
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.

Comment 5 Zack Miele 2023-02-07 18:00:14 UTC
Created edk2 tracking bugs for this issue:

Affects: fedora-36 [bug 2167917]
Affects: fedora-37 [bug 2167925]


Created mingw-openssl tracking bugs for this issue:

Affects: fedora-36 [bug 2167918]
Affects: fedora-37 [bug 2167924]


Created openssl tracking bugs for this issue:

Affects: fedora-36 [bug 2167919]
Affects: fedora-37 [bug 2167926]


Created openssl1.1 tracking bugs for this issue:

Affects: fedora-36 [bug 2167920]
Affects: fedora-37 [bug 2167927]


Created openssl11 tracking bugs for this issue:

Affects: epel-7 [bug 2167915]


Created openssl3 tracking bugs for this issue:

Affects: epel-8 [bug 2167914]


Created shim tracking bugs for this issue:

Affects: fedora-36 [bug 2167921]
Affects: fedora-37 [bug 2167928]


Created shim-unsigned-aarch64 tracking bugs for this issue:

Affects: fedora-36 [bug 2167922]
Affects: fedora-37 [bug 2167929]


Created shim-unsigned-x64 tracking bugs for this issue:

Affects: fedora-36 [bug 2167923]
Affects: fedora-37 [bug 2167930]

Comment 8 errata-xmlrpc 2023-02-28 08:18:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0946 https://access.redhat.com/errata/RHSA-2023:0946

Comment 9 Christopher Voltz 2023-03-10 16:11:42 UTC
Do we have a schedule for when a RHEL 8 fix will be available?

Comment 10 errata-xmlrpc 2023-03-14 13:52:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:1199 https://access.redhat.com/errata/RHSA-2023:1199

Comment 11 errata-xmlrpc 2023-03-22 10:33:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:1405 https://access.redhat.com/errata/RHSA-2023:1405

Comment 12 Product Security DevOps Team 2023-03-22 14:03:46 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-4304

Comment 13 errata-xmlrpc 2023-05-09 07:13:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2165 https://access.redhat.com/errata/RHSA-2023:2165

Comment 14 errata-xmlrpc 2023-05-16 08:29:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2932 https://access.redhat.com/errata/RHSA-2023:2932

Comment 15 errata-xmlrpc 2023-05-31 18:36:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:3408 https://access.redhat.com/errata/RHSA-2023:3408

Comment 16 errata-xmlrpc 2023-06-05 11:47:05 UTC
This issue has been addressed in the following products:

  JBCS httpd 2.4.51.sp2

Via RHSA-2023:3355 https://access.redhat.com/errata/RHSA-2023:3355

Comment 17 errata-xmlrpc 2023-06-05 11:50:52 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services for RHEL 8

Via RHSA-2023:3354 https://access.redhat.com/errata/RHSA-2023:3354

Comment 18 errata-xmlrpc 2023-06-05 13:56:03 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 5.7 on RHEL 7
  Red Hat JBoss Web Server 5.7 on RHEL 8
  Red Hat JBoss Web Server 5.7 on RHEL 9

Via RHSA-2023:3420 https://access.redhat.com/errata/RHSA-2023:3420

Comment 19 errata-xmlrpc 2023-06-05 14:16:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server

Via RHSA-2023:3421 https://access.redhat.com/errata/RHSA-2023:3421

Comment 20 errata-xmlrpc 2023-07-18 08:19:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:4128 https://access.redhat.com/errata/RHSA-2023:4128