Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1591163 - (CVE-2018-0495) CVE-2018-0495 openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries
CVE-2018-0495 openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180613,repor...
: Security
: CVE-2018-12437 (view as bug list)
Depends On: 1591167 1591168 1591170 1591171 1591173 1591175 1591176 1591906 1624230 1624231 1591164 1591165 1591166 1591169 1591172 1591174 1591177 1591178 1591179 1591367 1591368 1591392 1591393 1591803 1591905
Blocks: 1591154
  Show dependency treegraph
 
Reported: 2018-06-14 04:05 EDT by Andrej Nemec
Modified: 2018-10-31 18:59 EDT (History)
90 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3221 None None None 2018-10-30 03:52 EDT

  None (edit)
Description Andrej Nemec 2018-06-14 04:05:05 EDT
An implementation flaw was discovered in multiple cryptographic libraries that allows a side-channel based attacker to recover ECDSA or DSA private keys. When these cryptographic libraries use the private key to create a signature, such as for a TLS or SSH connection, they inadvertently leak information through memory caches. An unprivileged attacker running on the same machine can collect the information from a few thousand signatures and recover the value of the private key.

External References:

https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Comment 1 Andrej Nemec 2018-06-14 04:06:32 EDT
Created botan tracking bugs for this issue:

Affects: epel-all [bug 1591169]
Affects: fedora-all [bug 1591172]


Created cryptlib tracking bugs for this issue:

Affects: epel-7 [bug 1591166]
Affects: fedora-all [bug 1591165]


Created libgcrypt tracking bugs for this issue:

Affects: fedora-all [bug 1591174]


Created libtomcrypt tracking bugs for this issue:

Affects: epel-all [bug 1591179]
Affects: fedora-all [bug 1591178]


Created mingw-libgcrypt tracking bugs for this issue:

Affects: epel-7 [bug 1591176]
Affects: fedora-all [bug 1591175]


Created mingw-openssl tracking bugs for this issue:

Affects: epel-7 [bug 1591167]
Affects: fedora-all [bug 1591168]


Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1591164]


Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1591170]
Comment 14 Pedro Yóssis Silva Barbosa 2018-07-12 13:56:37 EDT
*** Bug 1591904 has been marked as a duplicate of this bug. ***
Comment 15 Doran Moppert 2018-08-19 21:32:59 EDT
Bouncycastle was mentioned in this report as having "non-constant math, but different code pattern" which might point to a theoretical weakness in Bouncycastle's implementation of Elliptic Curve cryptography.  However the CVE-2018-0495 issue does not apply to Bouncycastle, thus it is considered "not affected" by this flaw.

Bouncycastle inherently relies upon Java BigInteger arithmetic, which is not constant-time by design, so other countermeasures are needed to mitigate timing/side channel attacks.  In RSA operations, Bouncycastle uses blinding (ref CVE-2016-1000341).  Since 1.59, EC operations use a table lookup to prevent information leaks through similar channels.
Comment 16 Huzaifa S. Sidhpurwala 2018-08-30 23:36:39 EDT
Libgcrypt upstream commit:

https://github.com/gpg/libgcrypt/commit/9010d1576e278a4274ad3f4aa15776c28f6ba965
Comment 17 Huzaifa S. Sidhpurwala 2018-08-30 23:49:07 EDT
libgcrypt in Red Hat Enterprise Linux, does not enable ECC code. Since only ECDSA in libgcrypt is vulnerable, it seems RHEL versions of libgcrypt may not be vulnerable to this flaw.

This issue was addressed by Mozilla nss in version nss-3.38
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes

OpenSSL upstream patches:
https://git.openssl.org/?p=openssl.git;a=commit;h=949ff36623eafc3523a9f91784992965018ffb05 (1.0.2)
https://git.openssl.org/?p=openssl.git;a=commit;h=0c27d793745c7837b13646302b6890a556b7017a (1.1)
Comment 19 errata-xmlrpc 2018-10-30 03:51:35 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3221

Note You need to log in before you can comment on or make changes to this bug.