Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1393929 - (CVE-2016-7055) CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20161011,reported=2...
: Security
Depends On: 1394616 1394618
Blocks: 1393931 1416858
  Show dependency treegraph
 
Reported: 2016-11-10 11:18 EST by Adam Mariš
Modified: 2018-10-19 17:38 EDT (History)
40 users (show)

See Also:
Fixed In Version: openssl 1.0.2k, openssl 1.1.0c
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2185 None None None 2018-07-12 12:17 EDT
Red Hat Product Errata RHSA-2018:2186 None None None 2018-07-12 12:14 EDT
Red Hat Product Errata RHSA-2018:2187 None None None 2018-07-12 12:05 EDT

  None (edit)
Description Adam Mariš 2016-11-10 11:18:18 EST
Quoting form the OpenSSL upstream advisory:

Montgomery multiplication may produce incorrect results (CVE-2016-7055)
=======================================================================

Severity: Low

There is a carry propagating bug in the Broadwell-specific Montgomery
multiplication procedure that handles input lengths divisible by, but
longer than 256 bits. Analysis suggests that attacks against RSA, DSA
and DH private keys are impossible. This is because the subroutine in
question is not used in operations with the private key itself and an input
of the attacker's direct choice. Otherwise the bug can manifest itself as
transient authentication and key negotiation failures or reproducible
erroneous outcome of public-key operations with specially crafted input.
Among EC algorithms only Brainpool P-512 curves are affected and one
presumably can attack ECDH key negotiation. Impact was not analyzed in
detail, because pre-requisites for attack are considered unlikely. Namely
multiple clients have to choose the curve in question and the server has to
share the private key among them, neither of which is default behaviour.
Even then only clients that chose the curve will be affected.

OpenSSL 1.1.0 users should upgrade to 1.1.0c

This issue does not affect OpenSSL versions prior to 1.0.2. Due to the low
severity of this defect we are not issuing a new 1.0.2 release at this time.
We recommend that 1.0.2 users wait for the next 1.0.2 release for the fix to
become available. The fix is also available in the OpenSSL git repository in
commit 57c4b9f6a2.

This issue was publicly reported as transient failures and was not
initially recognized as a security issue. Thanks to Richard Morgan for
providing reproducible case. The fix was developed by Andy Polyakov of
the OpenSSL development team.

https://www.openssl.org/news/secadv/20161110.txt
Comment 1 Adam Mariš 2016-11-10 11:18:23 EST
Acknowledgments:

Name: the OpenSSL project
Comment 2 Huzaifa S. Sidhpurwala 2016-11-11 01:19:58 EST
Upstream patch (against master):

https://github.com/openssl/openssl/commit/2fac86d9abeaa643677d1ffd0a139239fdf9406a
Comment 5 Tomas Hoger 2017-01-26 10:12:09 EST
This was now also fixed in OpenSSL 1.0.2k.

Quoting from the upstream advisory:

https://www.openssl.org/news/secadv/20170126.txt


Montgomery multiplication may produce incorrect results (CVE-2016-7055)
=======================================================================

Severity: Low

This issue was previously fixed in 1.1.0c and covered in security advisory
https://www.openssl.org/news/secadv/20161110.txt

OpenSSL 1.0.2 users should upgrade to 1.0.2k
Comment 7 errata-xmlrpc 2018-07-12 12:05:16 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2018:2187 https://access.redhat.com/errata/RHSA-2018:2187
Comment 8 errata-xmlrpc 2018-07-12 12:14:35 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2186
Comment 9 errata-xmlrpc 2018-07-12 12:16:59 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2185

Note You need to log in before you can comment on or make changes to this bug.