Bug 1788261 (CVE-2018-11751)

Summary: CVE-2018-11751 puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bbuckingham, bcourt, bkearney, btotty, dbecker, hhudgeon, jjoyce, jschluet, lhh, lpeer, lutter, lzap, mburns, mmagr, mmccune, rchan, rjerrido, sclewis, slinaber, sokeeffe, s, terje.rosten
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: puppet-agent 6.4.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Puppet, where the Puppet Agent did not verify the peer in the SSL connection before downloading to the Certificate Revocation List (CRL). The primary risk is the availability of communications to computing systems and not Puppet itself. This flaw allows an attacker to submit a phony CRL, potentially denying future automation of systems driven by Puppet.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-10-27 14:21:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1788264, 1798607, 1806607, 1806608, 1806609, 1819339, 1819340, 1825807, 1866706    
Bug Blocks: 1788266    

Description Pedro Sampaio 2020-01-06 20:27:18 UTC
Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL. This issue is resolved in Puppet Agent 6.4.0.

References:

https://puppet.com/security/cve/CVE-2018-11751/

Comment 1 Nick Tait 2020-01-15 21:30:38 UTC
There was a period missing in the "fixed in" field, so I corrected that.

Comment 2 Nick Tait 2020-01-15 21:30:40 UTC
External References:

https://tickets.puppetlabs.com/browse/PUP-9459

Comment 9 Nick Tait 2020-03-31 18:01:17 UTC
Created puppet tracking bugs for this issue:

Affects: epel-7 [bug 1819340]
Affects: fedora-all [bug 1819339]

Comment 13 errata-xmlrpc 2020-10-27 12:55:33 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.7 for RHEL 8

Via RHSA-2020:4366 https://access.redhat.com/errata/RHSA-2020:4366

Comment 14 Product Security DevOps Team 2020-10-27 14:21:16 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-11751