Red Hat Bugzilla – Bug 1561266
CVE-2018-0739 openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
Last modified: 2018-10-30 03:51:25 EDT
OpenSSL versions 1.0.2 and 1.1.0 have a vulnerability in the handling of recursive ASN.1 structures. Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. External References: https://www.openssl.org/news/secadv/20180327.txt Upstream Patches: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1561269] Created mingw-openssl tracking bugs for this issue: Affects: epel-7 [bug 1561267]
compat-openssl10-1.0.2o-1.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report.
compat-openssl10-1.0.2o-1.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report.
compat-openssl10-1.0.2o-1.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3090 https://access.redhat.com/errata/RHSA-2018:3090
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3221