Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1618861 - (CVE-2018-15836) CVE-2018-15836 openswan: Improper signature verification in try_RSA_signature_v2() fucntion for RSASSA-PKCS1-v1_5 signature scheme
CVE-2018-15836 openswan: Improper signature verification in try_RSA_signature...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180817,repor...
: Security
Depends On:
Blocks: 1618862
  Show dependency treegraph
 
Reported: 2018-08-17 16:05 EDT by Pedro Sampaio
Modified: 2018-09-27 23:18 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-08-19 23:04:45 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Pedro Sampaio 2018-08-17 16:05:38 EDT
A flaw was found in openswan v2.6.50. Improper signature verification for RSASSA-PKCS1-v1_5 signature scheme in the try_RSA_signature_v2() function may leave it open to Bleichenbacher-style signature forgery attacks.

Upstream patch:

https://github.com/xelerance/Openswan/pull/317#issuecomment-413738632

References:

https://lists.openswan.org/pipermail/users/2018-August/023758.html
Comment 1 Paul Wouters 2018-08-17 16:36:14 EDT
note this flaw only affects openswan versions compiled without NSS. When NSS is used as cryptographic library, the RSA routines from NSS are used instead of the custom openswan RSA code that contains the vulnerability.

RHEL has only ever shipped with NSS enabled openswan versions, so no Red Hat products are vulnerable to this bug.
Comment 2 Doran Moppert 2018-08-19 23:04:52 EDT
Statement:

This flaw only affects openswan versions compiled without NSS. When NSS is used as cryptographic library, the RSA routines from NSS are used instead of the custom openswan RSA code that contains the vulnerability.

Red Hat Enterprise Linux has only ever shipped with NSS enabled openswan versions, so no Red Hat products are vulnerable to this bug.

Note You need to log in before you can comment on or make changes to this bug.