Bug 1640217 (CVE-2018-1000807)

Summary: CVE-2018-1000807 pyOpenSSL: Use-after-free in X509 object handling
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, apevec, bmcclain, chrisw, dbaker, dblechte, dfediuck, dmoppert, eedri, jjoyce, jlieskov, jokerman, jruzicka, jschluet, kbasil, lewk, lhh, lpeer, mariel, markmc, mburns, mgoldboi, michal.skrivanek, mmirecki, rhos-maint, sbonazzo, sclewis, sherold, sisharma, slinaber, ssaha, sthangav, szidek, tdecacqu, tmraz, trankin, vbellur, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pyOpenSSL 17.5.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:39:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1640218, 1640219, 1642769, 1642776, 1642777, 1642778, 1642779, 1649621, 1654552    
Bug Blocks: 1640222    

Description Andrej Nemec 2018-10-17 14:55:13 UTC
Python Cryptographic Authority pyopenssl version before 17.5.0 has a use-after-free vulnerability in X509 object handling. This can result in a denial of service or potentially even code execution

Upstream issue:

https://github.com/pyca/pyopenssl/pull/723

Comment 1 Andrej Nemec 2018-10-17 14:56:17 UTC
Created pyOpenSSL tracking bugs for this issue:

Affects: fedora-28 [bug 1640218]
Affects: openstack-rdo [bug 1640219]

Comment 9 Doran Moppert 2018-10-25 23:18:19 UTC
Based on discussions with engineering, and examination of the code we ship that uses pyOpenSSL, the severity of this issue has been downgraded.  This vulnerability is only exposed when a verify callback stores a reference to the x509 object that will outlive the connection, which is a very unusual need for most applications.  We have not observed any code exhibiting this pattern in Red Hat products.

Comment 18 errata-xmlrpc 2019-01-16 17:53:23 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 (Queens)

Via RHSA-2019:0085 https://access.redhat.com/errata/RHSA-2019:0085

Comment 19 Doran Moppert 2020-07-03 01:33:47 UTC
Statement:

This vulnerability is only present when a specific and uncommon usage pattern of pyOpenSSL occurs. Red Hat Product Security has audited our packages that use pyOpenSSL, and determined that software we distribute in Red Hat Enterprise Linux and Red Hat Virtualization does not use pyOpenSSL in such a way as to be vulnerable. Future updates may address this issue.