Bug 1904459

Summary: CVE-2021-20201 spice: OpenSSL(TLS/SSL) Security DoS Vulnerability - enables client-initiated renegotiation [rhel-8]
Product: Red Hat Enterprise Linux 8 Reporter: Julien Ropé <jrope>
Component: spiceAssignee: Julien Ropé <jrope>
Status: CLOSED ERRATA QA Contact: SPICE QE bug list <spice-qe-bugs>
Severity: low Docs Contact:
Priority: low    
Version: ---CC: djasa, spice-qe-bugs, tpelka, uril, ymankad
Target Milestone: rcKeywords: Security, SecurityTracking, Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: spice-0.14.3-4.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 16:09:30 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1921846    

Description Julien Ropé 2020-12-04 14:21:34 UTC
Description of problem:
First reported here: https://gitlab.freedesktop.org/spice/spice/-/issues/49

When using TLS to secure the communication to the VM, SPICE is allowing client-initiated renegotiation of ciphers, which can be used to trigger a DoS attack on the host (see https://nvd.nist.gov/vuln/detail/CVE-2011-1473)


How reproducible:
Using the testssl.sh script (from https://testssl.sh/), you can check the vulnerability of a service.

Steps to Reproduce:
1. Setup secure connexion on a SPICE VM using TLS
2. Use testssl.sh to check for the vulnerability

Actual results:
testssl.sh reports the following:

Secure Client-Initiated Renegotiation     VULNERABLE (NOT ok), potential DoS threat

Expected results:

Secure Client-Initiated Renegotiation     likely not vulnerable (OK), timed out

Comment 9 errata-xmlrpc 2021-05-18 16:09:30 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Low: spice security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:1924