Bug 1618861 (CVE-2018-15836)

Summary: CVE-2018-15836 openswan: Improper signature verification in try_RSA_signature_v2() fucntion for RSASSA-PKCS1-v1_5 signature scheme
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: pwouters
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-08-20 03:04:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1618862    

Description Pedro Sampaio 2018-08-17 20:05:38 UTC
A flaw was found in openswan v2.6.50. Improper signature verification for RSASSA-PKCS1-v1_5 signature scheme in the try_RSA_signature_v2() function may leave it open to Bleichenbacher-style signature forgery attacks.

Upstream patch:

https://github.com/xelerance/Openswan/pull/317#issuecomment-413738632

References:

https://lists.openswan.org/pipermail/users/2018-August/023758.html

Comment 1 Paul Wouters 2018-08-17 20:36:14 UTC
note this flaw only affects openswan versions compiled without NSS. When NSS is used as cryptographic library, the RSA routines from NSS are used instead of the custom openswan RSA code that contains the vulnerability.

RHEL has only ever shipped with NSS enabled openswan versions, so no Red Hat products are vulnerable to this bug.

Comment 2 Doran Moppert 2018-08-20 03:04:52 UTC
Statement:

This flaw only affects openswan versions compiled without NSS. When NSS is used as cryptographic library, the RSA routines from NSS are used instead of the custom openswan RSA code that contains the vulnerability.

Red Hat Enterprise Linux has only ever shipped with NSS enabled openswan versions, so no Red Hat products are vulnerable to this bug.