Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1523504 - (CVE-2017-3737) CVE-2017-3737 openssl: Read/write after SSL object in error state
CVE-2017-3737 openssl: Read/write after SSL object in error state
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171207,repor...
: Security
Depends On: 1523511 1523513 1524795 1524796 1527300 1525029 1525347 1544443
Blocks: 1523515
  Show dependency treegraph
 
Reported: 2017-12-08 02:36 EST by Andrej Nemec
Modified: 2018-10-19 17:44 EDT (History)
61 users (show)

See Also:
Fixed In Version: openssl 1.0.2n
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0998 None None None 2018-04-10 04:40 EDT
Red Hat Product Errata RHSA-2018:2185 None None None 2018-07-12 12:18 EDT
Red Hat Product Errata RHSA-2018:2186 None None None 2018-07-12 12:15 EDT
Red Hat Product Errata RHSA-2018:2187 None None None 2018-07-12 12:06 EDT

  None (edit)
Description Andrej Nemec 2017-12-08 02:36:43 EST
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
mechanism. The intent was that if a fatal error occurred during a handshake then
OpenSSL would move into the error state and would immediately fail if you
attempted to continue the handshake. This works as designed for the explicit
handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),
however due to a bug it does not work correctly if SSL_read() or SSL_write() is
called directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If SSL_read()/SSL_write() is
subsequently called by the application for the same SSL object then it will
succeed and the data is passed without being decrypted/encrypted directly from
the SSL/TLS record layer.

In order to exploit this issue an application bug would have to be present that
resulted in a call to SSL_read()/SSL_write() being issued after having already
received a fatal error.

External References:

https://www.openssl.org/news/secadv/20171207.txt
Comment 1 Andrej Nemec 2017-12-08 02:41:44 EST
Created mingw-openssl tracking bugs for this issue:

Affects: epel-7 [bug 1523513]
Affects: fedora-all [bug 1523511]


Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1523512]
Comment 7 Ravindra Patil 2018-01-15 15:49:07 EST
Any ETA for release of fix for openssl ?
Comment 9 mis 2018-02-20 13:32:13 EST
Any ETA on this... Failing PCI Scans because of this...
Comment 10 Doug Cox 2018-02-26 14:46:13 EST
I'm also have PCI scans fail and the Treasurer is not happy!  Any ETA would be helpful.  Thanks
Comment 13 mis 2018-03-02 09:40:59 EST
Can anyone from Redhat provide feedback on where this issue sits?

An ETA has been requested multiple times, with no response.

Feedback, with an ETA would be extremely helpful.
Comment 15 mis 2018-04-03 08:59:40 EDT
It's now been almost 4 months since this bug was identified, and there is still no updated package, and no ETA on an updated package.

What's the problem here?

Can we all get an ETA on this update?
Comment 16 Calvin Smith 2018-04-09 20:18:58 EDT
Per https://bugzilla.redhat.com/show_bug.cgi?id=1544443, this is fixed in RHEL 7.5
Comment 17 errata-xmlrpc 2018-04-10 04:39:38 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0998 https://access.redhat.com/errata/RHSA-2018:0998
Comment 18 errata-xmlrpc 2018-07-12 12:05:55 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2018:2187 https://access.redhat.com/errata/RHSA-2018:2187
Comment 19 errata-xmlrpc 2018-07-12 12:15:39 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2186
Comment 20 errata-xmlrpc 2018-07-12 12:18:00 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2185

Note You need to log in before you can comment on or make changes to this bug.