Bug 1101347 (CVE-2014-3250)

Summary: CVE-2014-3250 puppet: certificates could be honored even when revoked
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, apevec, bkearney, cbillett, ccoleman, chrisw, cpelland, dmcphers, gkotton, gmollett, jialiu, jokerman, jorton, katello-bugs, lhh, lmeyer, markmc, mmccomas, mmccune, mmcgrath, rbryant, sclewis, security-response-team, srevivo, tomckay
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-20 10:44:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1107897, 1108503    
Bug Blocks: 1101348    
Attachments:
Description Flags
upstream patch
none
revised upstream patch none

Description Murray McAllister 2014-05-27 03:06:40 UTC
Upstream reports:

""
In Apache 2.4, SSLCARevocationCheck directive was added to mod_ssl,
which defaults it to none and must be explicitly configured. This
setting enables checking of a certificate revocation list. The default
Puppet master vhost config shipped with Puppet does not include this
setting. If a Puppet master is set up to run with Apache 2.4, and this
default vhost configuration file is used, the Puppet master will
continue to honor a host's certificate even after it is revoked.
""

Acknowledgements:

Red Hat would like to thank Puppet Labs for reporting this issue.

Comment 2 Murray McAllister 2014-05-27 03:09:26 UTC
Created attachment 899367 [details]
upstream patch

Comment 6 Murray McAllister 2014-06-05 05:08:27 UTC
Created attachment 902402 [details]
revised upstream patch

Comment 8 Murray McAllister 2014-06-11 01:13:01 UTC
(In reply to Murray McAllister from comment #6)
> Created attachment 902402 [details]
> revised upstream patch

A revision was not needed here. It is OK for it to be identical to the obsoleted patch.

Comment 9 Murray McAllister 2014-06-11 01:15:55 UTC
This issue was fixed in upstream version Puppet 3.6.2.

External References:

http://puppetlabs.com/security/cve/CVE-2014-3250

Comment 10 Murray McAllister 2014-06-11 01:16:49 UTC
Created puppet tracking bugs for this issue:

Affects: fedora-all [bug 1107897]

Comment 11 Kurt Seifried 2014-06-12 07:07:59 UTC
Statement:

Not vulnerable. This issue did not affect the versions of puppet as shipped with Red Hat Subscription Asset Manager 1.3 as they did not include puppet-server.