Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1640217 - (CVE-2018-1000807) CVE-2018-1000807 pyOpenSSL: Use-after-free in X509 object handling [NEEDINFO]
CVE-2018-1000807 pyOpenSSL: Use-after-free in X509 object handling
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171129,repor...
: Security
Depends On: 1640218 1640219 1642776 1642777 1642778 1642779 1642769
Blocks: 1640222
  Show dependency treegraph
 
Reported: 2018-10-17 10:55 EDT by Andrej Nemec
Modified: 2018-11-01 02:16 EDT (History)
38 users (show)

See Also:
Fixed In Version: pyOpenSSL 17.5.0
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
pharvey: needinfo? (dmoppert)


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2018-10-17 10:55:13 EDT
Python Cryptographic Authority pyopenssl version before 17.5.0 has a use-after-free vulnerability in X509 object handling. This can result in a denial of service or potentially even code execution

Upstream issue:

https://github.com/pyca/pyopenssl/pull/723
Comment 1 Andrej Nemec 2018-10-17 10:56:17 EDT
Created pyOpenSSL tracking bugs for this issue:

Affects: fedora-28 [bug 1640218]
Affects: openstack-rdo [bug 1640219]
Comment 9 Doran Moppert 2018-10-25 19:18:19 EDT
Based on discussions with engineering, and examination of the code we ship that uses pyOpenSSL, the severity of this issue has been downgraded.  This vulnerability is only exposed when a verify callback stores a reference to the x509 object that will outlive the connection, which is a very unusual need for most applications.  We have not observed any code exhibiting this pattern in Red Hat products.

Note You need to log in before you can comment on or make changes to this bug.