Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1568253 - (CVE-2018-0737) CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypt...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180416,reported=2...
: Security
Depends On: 1568254 1568257 1568681 1568255 1568256 1568682
Blocks: 1568258
  Show dependency treegraph
 
Reported: 2018-04-17 00:08 EDT by Sam Fowler
Modified: 2018-10-30 03:51 EDT (History)
37 users (show)

See Also:
Fixed In Version: openssl 1.1.0i, openssl 1.0.2p
Doc Type: If docs needed, set a value
Doc Text:
OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3221 None None None 2018-10-30 03:51 EDT

  None (edit)
Description Sam Fowler 2018-04-17 00:08:30 EDT
OpenSSL before versions 1.0.2p and 1.1.0i are vulnerable to RSA key generation cache timing side channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.


External References:

https://www.openssl.org/news/secadv/20180416.txt
http://www.openwall.com/lists/oss-security/2018/04/16/3


Upstream Patches:

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
Comment 1 Sam Fowler 2018-04-17 00:09:16 EDT
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1568256]


Created mingw-openssl tracking bugs for this issue:

Affects: fedora-all [bug 1568257]
Affects: epel-7 [bug 1568254]
Comment 3 Huzaifa S. Sidhpurwala 2018-04-17 00:51:11 EDT
Analysis:

This attack needs the attacker to be present on the same physical machine, where the key is being generated. Also the attack has to be mounted at the exact time, when the RSA private key is being generated, to be useful. Enterprise setups where HSM modules are used to generate and store RSA private keys are not affected by this flaw.
Comment 8 errata-xmlrpc 2018-10-30 03:51:29 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3221

Note You need to log in before you can comment on or make changes to this bug.