Bug 1165022

Summary: vdsclient does not validate certficate hostname to vdsm
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acathrow, alonbl, bazulay, bmcclain, dblechte, ecohen, falonso, gklein, idith, iheim, jrusnack, lpeer, lsurette, michal.skrivanek, nobody, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-02-12 05:35:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1165442, 1165462    
Bug Blocks: 1164675    

Description Murray McAllister 2014-11-18 06:56:12 UTC
Multiple security flaws were found in the vdsm SSL certificate validation code. Details:

Vdsclient can connect to VDSM services for remote management of virtual hosts stored on a remote node. During the connection the remote node presents a certificate.  The hostname of the remote host is presented in the certificate but not validated by the client connection to ensure that the host matches the correct name.  The SSL client should compare the hostname presented in the certificate to the host name returned in the server certificates "Common Name" field of the "subjectDN" entry. If this is not the case the connection should fail.

Comment 4 Kurt Seifried 2015-02-12 05:35:43 UTC

*** This bug has been marked as a duplicate of bug 1165015 ***