Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1362016 - (CVE-2016-6489) CVE-2016-6489 nettle: RSA/DSA code is vulnerable to cache-timing related attacks
CVE-2016-6489 nettle: RSA/DSA code is vulnerable to cache-timing related attacks
Status: ASSIGNED
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160620,repor...
: Reopened, Security
Depends On: 1362017 1362018 1362020 1362021 1362022 1364897 1429958 1429959
Blocks: 1323912
  Show dependency treegraph
 
Reported: 2016-08-01 03:55 EDT by Huzaifa S. Sidhpurwala
Modified: 2017-03-08 13:18 EST (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that nettle's RSA and DSA decryption code was vulnerable to cache-related side channel attacks. An attacker could use this flaw to recover the private key from a co-located virtual-machine instance.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-11-04 04:30:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2582 normal SHIPPED_LIVE Moderate: nettle security and bug fix update 2016-11-03 08:08:24 EDT

  None (edit)
Description Huzaifa S. Sidhpurwala 2016-08-01 03:55:45 EDT
A cache-related side channel was found in nettle's RSA and DSA decryption code. An attacker could use this flaw to recover the private key, from a co-located virtual-machine instance.


References:

https://eprint.iacr.org/2016/596.pdf
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3
Comment 1 Huzaifa S. Sidhpurwala 2016-08-01 03:56:51 EDT
Created nettle tracking bugs for this issue:

Affects: fedora-all [bug 1362017]
Affects: epel-5 [bug 1362021]
Comment 2 Huzaifa S. Sidhpurwala 2016-08-01 03:56:59 EDT
Created mingw-nettle tracking bugs for this issue:

Affects: fedora-all [bug 1362018]
Affects: epel-7 [bug 1362022]
Comment 3 Huzaifa S. Sidhpurwala 2016-08-01 03:57:04 EDT
Created compat-nettle27 tracking bugs for this issue:

Affects: fedora-23 [bug 1362020]
Comment 4 Huzaifa S. Sidhpurwala 2016-08-01 03:59:23 EDT
Note:

As per: http://seclists.org/oss-sec/2016/q3/206 , the upstream fix has "some unintended side effects" and needs to be reviewed before being applied.
Comment 6 Nikos Mavrogiannopoulos 2016-08-08 03:36:47 EDT
The upstream author has included sanity checks at the functions using mpz_powm_sec() to prevent crashes by invalid private keys. As such, the unintended side-effects are no longer the case.

https://git.lysator.liu.se/nettle/nettle/commit/52b9223126b3f997c00d399166c006ae28669068
Comment 7 errata-xmlrpc 2016-11-03 15:31:30 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2582 https://rhn.redhat.com/errata/RHSA-2016-2582.html

Note You need to log in before you can comment on or make changes to this bug.