Bug 1668488 (CVE-2019-0190)

Summary: CVE-2019-0190 httpd: mod_ssl: infinite loop triggered by client-initiated renegotiation when using OpenSSL 1.1.1
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bmcclain, dblechte, dfediuck, eedri, lakagwu, mgoldboi, michal.skrivanek, sbonazzo, sherold, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: httpd 2.4.38 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way mod_ssl handled client renegotiations. A remote attacker could send a malicious request to cause mod_ssl to enter an infinite loop resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-01-31 09:58:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1668489, 1671282    
Bug Blocks: 1668499    

Description Laura Pardo 2019-01-22 21:06:14 UTC
A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service.  This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.


References:
https://seclists.org/oss-sec/2019/q1/82
https://httpd.apache.org/security/vulnerabilities_24.html

Comment 1 Laura Pardo 2019-01-22 21:06:26 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-29 [bug 1668489]

Comment 3 Tomas Hoger 2019-01-31 09:58:29 UTC
OpenSSL 1.1.1 is not currently used by any released product containing httpd.