Bug 1788261 (CVE-2018-11751)
Summary: | CVE-2018-11751 puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bbuckingham, bcourt, bkearney, btotty, dbecker, hhudgeon, jjoyce, jschluet, lhh, lpeer, lutter, lzap, mburns, mmagr, mmccune, rchan, rjerrido, sclewis, slinaber, sokeeffe, s, terje.rosten |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | puppet-agent 6.4.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Puppet, where the Puppet Agent did not verify the peer in the SSL connection before downloading to the Certificate Revocation List (CRL). The primary risk is the availability of communications to computing systems and not Puppet itself. This flaw allows an attacker to submit a phony CRL, potentially denying future automation of systems driven by Puppet.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-10-27 14:21:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1788264, 1798607, 1806607, 1806608, 1806609, 1819339, 1819340, 1825807, 1866706 | ||
Bug Blocks: | 1788266 |
Description
Pedro Sampaio
2020-01-06 20:27:18 UTC
There was a period missing in the "fixed in" field, so I corrected that. External References: https://tickets.puppetlabs.com/browse/PUP-9459 Created puppet tracking bugs for this issue: Affects: epel-7 [bug 1819340] Affects: fedora-all [bug 1819339] This issue has been addressed in the following products: Red Hat Satellite 6.7 for RHEL 8 Via RHSA-2020:4366 https://access.redhat.com/errata/RHSA-2020:4366 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-11751 |