Potential pre-authentication buffer overflow due to integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function can lead to denial of service or potentially to remote code execution. Vulnerable code: static int authenticate_nss_2_3 ( struct crypto_instance *instance, unsigned char *buf, int *buf_len) { if (hash_to_nss[instance->crypto_hash_type]) { unsigned char tmp_hash[hash_len[instance->crypto_hash_type]]; int datalen = *buf_len - hash_len[instance->crypto_hash_type]; if (calculate_nss_hash(instance, buf, datalen, tmp_hash) < 0) { return -1; } ...
Acknowledgments: Name: Citrix Security Response Team
Created corosync tracking bugs for this issue: Affects: openstack-rdo [bug 1566481] Affects: fedora-all [bug 1566482]
Upstream commit: https://github.com/corosync/corosync/commit/fc1d5418533c1faf21616b282c2559bed7d361c4 Fixed upstream in version 2.4.4: https://github.com/corosync/corosync/wiki/Corosync-2.4.4-Release-Notes
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:1169 https://access.redhat.com/errata/RHSA-2018:1169
An integer overflow leading to an out-of-bound read was found in authenticate_nss_2_3() in Corosync. An attacker could craft a malicious packet that would lead to a denial of service.