Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1386584 - (CVE-2016-7440) CVE-2016-7440 yaSSL: AES key leak via cache-bank timing side channel attack
CVE-2016-7440 yaSSL: AES key leak via cache-bank timing side channel attack
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161019,repor...
: Security
Depends On:
Blocks: 1386598
  Show dependency treegraph
 
Reported: 2016-10-19 05:21 EDT by Adam Mariš
Modified: 2018-04-06 08:18 EDT (History)
29 users (show)

See Also:
Fixed In Version: mysql 5.5.53, mysql 5.6.34, mysql 5.7.16, yaSSL 2.4.2, wolfSSL 3.9.10, mariadb 5.5.53, mariadb 10.1.19, mariadb 10.0.28
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-10-19 07:05:38 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-10-19 05:21:16 EDT
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.52 and earlier, 5.6.33 and earlier and  5.7.15 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. 

External References:

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
Comment 1 Adam Mariš 2016-10-19 05:54:05 EDT
Created mariadb tracking bugs for this issue:

Affects: fedora-all [bug 1386608]
Comment 2 Adam Mariš 2016-10-19 05:54:21 EDT
Created community-mysql tracking bugs for this issue:

Affects: fedora-all [bug 1386607]
Comment 3 Adam Mariš 2016-10-19 05:54:32 EDT
Created mariadb-galera tracking bugs for this issue:

Affects: fedora-all [bug 1386609]
Comment 4 Tomas Hoger 2016-10-19 07:05:38 EDT
This is not a MySQL flaw, but a flaw in embedded yaSSL library:

https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
https://www.wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Now_Available.html

It is mentioned in the respective MySQL release notes as:

  yaSSL was upgraded to version 2.4.2. This upgrade corrects issues with:
  Potential AES side channel leaks; ...

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-16.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html

Further details form the yaSSL README:

https://github.com/mysql/mysql-server/commit/5c6169fb309981b564a17bee31b367a18866d674

yaSSL Release notes, version 2.4.2 (9/22/2016)
    This release of yaSSL fixes a medium security vulnerability. A fix for
    potential AES side channel leaks is included that a local user monitoring
    the same CPU core cache could exploit.  VM users, hyper-threading users,
    and users where potential attackers have access to the CPU cache will need
    to update if they utilize AES.

MySQL and MariaDB packages included in Red Hat products are built against system OpenSSL packages.  They are not using embedded yaSSL, and are therefore not affected by this issue.

Note You need to log in before you can comment on or make changes to this bug.