Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1561266 - (CVE-2018-0739) CVE-2018-0739 openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
CVE-2018-0739 openssl: Handling of crafted recursive ASN.1 structures can cau...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180327,repor...
: Security
Depends On: 1561267 1561268 1561269 1563285 1563286 1563287 1563288 1563289
Blocks: 1561270
  Show dependency treegraph
 
Reported: 2018-03-27 21:16 EDT by Sam Fowler
Modified: 2018-10-30 03:51 EDT (History)
45 users (show)

See Also:
Fixed In Version: openssl 1.1.0h, openssl 1.0.2o
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3090 None None None 2018-10-30 03:36 EDT
Red Hat Product Errata RHSA-2018:3221 None None None 2018-10-30 03:51 EDT

  None (edit)
Description Sam Fowler 2018-03-27 21:16:17 EDT
OpenSSL versions 1.0.2 and 1.1.0 have a vulnerability in the handling of recursive ASN.1 structures. Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe.


External References:

https://www.openssl.org/news/secadv/20180327.txt


Upstream Patches:

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
Comment 1 Sam Fowler 2018-03-27 21:17:08 EDT
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1561269]


Created mingw-openssl tracking bugs for this issue:

Affects: epel-7 [bug 1561267]
Comment 7 Fedora Update System 2018-04-09 09:26:57 EDT
compat-openssl10-1.0.2o-1.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2018-04-09 14:35:21 EDT
compat-openssl10-1.0.2o-1.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2018-04-09 15:09:15 EDT
compat-openssl10-1.0.2o-1.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.
Comment 11 errata-xmlrpc 2018-10-30 03:35:49 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3090 https://access.redhat.com/errata/RHSA-2018:3090
Comment 12 errata-xmlrpc 2018-10-30 03:51:09 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3221

Note You need to log in before you can comment on or make changes to this bug.