Bug 1101347 (CVE-2014-3250) - CVE-2014-3250 puppet: certificates could be honored even when revoked
Summary: CVE-2014-3250 puppet: certificates could be honored even when revoked
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-3250
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1107897 1108503
Blocks: 1101348
TreeView+ depends on / blocked
 
Reported: 2014-05-27 03:06 UTC by Murray McAllister
Modified: 2023-05-12 03:45 UTC (History)
25 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-20 10:44:42 UTC
Embargoed:


Attachments (Terms of Use)
upstream patch (9.35 KB, patch)
2014-05-27 03:09 UTC, Murray McAllister
no flags Details | Diff
revised upstream patch (9.35 KB, patch)
2014-06-05 05:08 UTC, Murray McAllister
no flags Details | Diff

Description Murray McAllister 2014-05-27 03:06:40 UTC
Upstream reports:

""
In Apache 2.4, SSLCARevocationCheck directive was added to mod_ssl,
which defaults it to none and must be explicitly configured. This
setting enables checking of a certificate revocation list. The default
Puppet master vhost config shipped with Puppet does not include this
setting. If a Puppet master is set up to run with Apache 2.4, and this
default vhost configuration file is used, the Puppet master will
continue to honor a host's certificate even after it is revoked.
""

Acknowledgements:

Red Hat would like to thank Puppet Labs for reporting this issue.

Comment 2 Murray McAllister 2014-05-27 03:09:26 UTC
Created attachment 899367 [details]
upstream patch

Comment 6 Murray McAllister 2014-06-05 05:08:27 UTC
Created attachment 902402 [details]
revised upstream patch

Comment 8 Murray McAllister 2014-06-11 01:13:01 UTC
(In reply to Murray McAllister from comment #6)
> Created attachment 902402 [details]
> revised upstream patch

A revision was not needed here. It is OK for it to be identical to the obsoleted patch.

Comment 9 Murray McAllister 2014-06-11 01:15:55 UTC
This issue was fixed in upstream version Puppet 3.6.2.

External References:

http://puppetlabs.com/security/cve/CVE-2014-3250

Comment 10 Murray McAllister 2014-06-11 01:16:49 UTC
Created puppet tracking bugs for this issue:

Affects: fedora-all [bug 1107897]

Comment 11 Kurt Seifried 2014-06-12 07:07:59 UTC
Statement:

Not vulnerable. This issue did not affect the versions of puppet as shipped with Red Hat Subscription Asset Manager 1.3 as they did not include puppet-server.


Note You need to log in before you can comment on or make changes to this bug.