Bug 1561260 (CVE-2018-0733)

Summary: CVE-2018-0733 openssl: Implementation bug in PA-RISC CRYPTO_memcmp function allows attackers to forge authenticated messages in a reduced number of attempts
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apintea, apmukher, bkundal, bmaxwell, cdewolf, chazlett, csutherl, darran.lofthouse, dimitris, dosoudil, erik-fedora, fgavrilo, gzaronik, jawilson, jclere, jondruse, jorton, ktietz, lersek, lgao, marcandre.lureau, mbabacek, mturk, myarboro, pgier, pjurak, ppalaga, psakar, pslavice, rjones, rnetuka, rstancel, rsvoboda, slawomir, sstavrev, tmraz, twalsh, vtunka, weli, xingli, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: openssl 1.1.0h Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-03 08:14:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1561261, 1561262, 1561263    
Bug Blocks: 1561264    

Description Sam Fowler 2018-03-28 01:02:43 UTC
OpenSSL 1.1.0 has an implementation bug in the PA-RISC CRYPTO_memcmp function that effectively results to only comparing the least significant bit of each byte.  This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected.


External References:

https://www.openssl.org/news/secadv/20180327.txt


Upstream Patch:

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f

Comment 1 Sam Fowler 2018-03-28 01:03:27 UTC
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1561263]


Created mingw-openssl tracking bugs for this issue:

Affects: epel-7 [bug 1561262]

Comment 4 Huzaifa S. Sidhpurwala 2018-04-03 08:13:42 UTC
Statement:

This flaw only affects the openssl code which is compiled by the HP-UX assembler, so that only HP-UX PA-RISC arches are affected. Red Hat Enterprise Linux does not support this architecture, and therefore is not affected.