Bug 1640217 (CVE-2018-1000807)
| Summary: | CVE-2018-1000807 pyOpenSSL: Use-after-free in X509 object handling | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | abhgupta, apevec, bmcclain, chrisw, dbaker, dblechte, dfediuck, dmoppert, eedri, jjoyce, jlieskov, jokerman, jruzicka, jschluet, kbasil, lewk, lhh, lpeer, mariel, markmc, mburns, mgoldboi, michal.skrivanek, mmirecki, rhos-maint, sbonazzo, sclewis, sherold, sisharma, slinaber, ssaha, sthangav, szidek, tdecacqu, tmraz, trankin, vbellur, yozone |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | pyOpenSSL 17.5.0 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-06-10 10:39:56 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1640218, 1640219, 1642769, 1642776, 1642777, 1642778, 1642779, 1649621, 1654552 | ||
| Bug Blocks: | 1640222 | ||
|
Description
Andrej Nemec
2018-10-17 14:55:13 UTC
Created pyOpenSSL tracking bugs for this issue: Affects: fedora-28 [bug 1640218] Affects: openstack-rdo [bug 1640219] Based on discussions with engineering, and examination of the code we ship that uses pyOpenSSL, the severity of this issue has been downgraded. This vulnerability is only exposed when a verify callback stores a reference to the x509 object that will outlive the connection, which is a very unusual need for most applications. We have not observed any code exhibiting this pattern in Red Hat products. This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2019:0085 https://access.redhat.com/errata/RHSA-2019:0085 Statement: This vulnerability is only present when a specific and uncommon usage pattern of pyOpenSSL occurs. Red Hat Product Security has audited our packages that use pyOpenSSL, and determined that software we distribute in Red Hat Enterprise Linux and Red Hat Virtualization does not use pyOpenSSL in such a way as to be vulnerable. Future updates may address this issue. |