[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2008:0577-02] Important: rhpki-common security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: rhpki-common security update
Advisory ID:       RHSA-2008:0577-02
Product:           Red Hat Certificate System
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0577.html
Issue date:        2008-07-02
CVE Names:         CVE-2008-1676 
=====================================================================

1. Summary:

Updated rhpki-common packages that fix a security issue are now available
for Red Hat Certificate System 7.2.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Certificate System 7.2 for 4AS - noarch
Red Hat Certificate System 7.2 for 4ES - noarch

3. Description:

Red Hat Certificate System (RHCS) is an enterprise software system designed
to manage enterprise Public Key Infrastructure (PKI) deployments.

rhpki-common -- the Red Hat PKI Common Framework -- is required by the
following four RHCS subsystems: the Red Hat Certificate Authority; the Red
Hat Data Recovery Manager; the Red Hat Online Certificate Status Protocol
Manager; and the Red Hat Token Key Service.

A flaw was found in the way Red Hat Certificate System handled Extensions
in the certificate signing requests (CSR). All requested Extensions were
added to the issued certificate even if constraints were defined in the
Certificate Authority (CA) profile. An attacker could submit a CSR for a
subordinate CA certificate even if the CA configuration prohibited
subordinate CA certificates. This lead to a bypass of the intended security
policy, possibly simplifying man-in-the-middle attacks against users that
trust Certificate Authorities managed by Red Hat Certificate System.
(CVE-2008-1676)

All users of Red Hat Certificate System 7.2 should upgrade to these updated
packages, which resolves this issue.

4. Solution:

Users running Red Hat Certificate System on Red Hat Enterprise Linux:

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Users running Red Hat Certificate System on Sun Solaris:

An updated Solaris packages in .pkg format are available in the Red Hat
Certificate System Solaris channels on the Red Hat Network. This packages
should be installed/upgraded using Solaris native package management tools.

See also Red Hat Certificate System Administration Guide for installation
instructions:
http://www.redhat.com/docs/manuals/cert-system/

5. Bugs fixed (http://bugzilla.redhat.com/):

445227 - CVE-2008-1676 Certificate System: incorrect handling of Extensions in CSRs

6. Package List:

Red Hat Certificate System 7.2 for 4AS:

noarch:
rhpki-common-7.2.0-11.noarch.rpm

Red Hat Certificate System 7.2 for 4ES:

noarch:
rhpki-common-7.2.0-11.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1676
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFIa8FVXlSAg2UNWIIRAiu2AJ9P5dT4rsMprlVfihwtLpuDSqFhjwCfbtCs
xo4LpIeWjPgiUh8Y9F4OmCk=
=xX4S
-----END PGP SIGNATURE-----



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]