Fix for CVE-2012-3867 (puppet) is too restrictive - TLS certificates now break

Bug #1068145 reported by Adam Stokes
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
puppet (Ubuntu)
Fix Released
High
Unassigned
Precise
Won't Fix
High
Unassigned
Quantal
Won't Fix
High
Unassigned
Raring
Won't Fix
High
Unassigned

Bug Description

1. Description of the problem:

On 12.04, for package 'puppet', the fix (contained in version 2.7.11-1ubuntu2.1) for CVE-2012-3867 [1] involves validating TLS certificate CSR field (Common Name) for “weird” characters. However, the check is too restrictive and is causing negotiation failure with legitimately-configured certificates:

===
warning: peer certificate won't be verified in this SSL session
err: Could not request certificate: Certname "/c=mlkambi root certificate authority" must not contain unprintable or non-ASCII characters
Exiting; failed to retrieve certificate and waitforcert is disabled
===

Here, puppet is choking on the '/' and maybe the '=' character.

The issue has been confirmed in an upstream bug [2].

[1]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3867
[2]: http://projects.puppetlabs.com/issues/15561

2. Ubuntu release, software version, Release Number and Architecture of the selected components.

Ubuntu 12.04
puppet-2.7.11-1ubuntu2.1
amd64

3. How reproducible is the problem?

100%

5. Known Workaround:

downgrade to puppet-2.7.11-1ubuntu2

CVE References

Changed in puppet (Ubuntu):
milestone: ubuntu-12.04.2 → none
Revision history for this message
Clint Byrum (clint-fewbar) wrote :

Marking Triaged, from the upstream bug report, it appears the fix is non-trivial, so while I hope we can fix this in precise, it may not be so simple.

Changed in puppet (Ubuntu):
status: New → Triaged
Changed in puppet (Ubuntu Precise):
status: New → Triaged
importance: Undecided → High
Revision history for this message
Adam Stokes (adam-stokes) wrote :

Looks like upstream has a pending release to fix this issue positive testing results from community.

Revision history for this message
Jeff McCune (jeff-puppetlabs) wrote :

Yes, we're planning to release the fix for this issue in Puppet 3.2 which will hopefully go out as RC1 at the end of this week.

I'm not sure how difficult the backport to 2.7 will be, but we did so a slight refactor after fixing the issue, so it is non-trivial at this point. If you have any questions or concerns please let me know, I'm getting all the updates on this issue directly to my inbox.

-Jeff

Revision history for this message
Adam Stokes (adam-stokes) wrote :

Jeff,

I've been searching through the documentation on puppet labs wiki but I am unable to find a tentative release date for 3.2.0. Do you have that information and if the date is set do you mind sharing that with me?

Thank you,
Adam

Revision history for this message
Jeff McCune (jeff-puppetlabs) wrote : Re: [Bug 1068145] Re: Fix for CVE-2012-3867 (puppet) is too restrictive - TLS certificates now break

On Fri, May 10, 2013 at 11:51 AM, Adam Stokes <email address hidden>wrote:

> Jeff,
>
> I've been searching through the documentation on puppet labs wiki but I
> am unable to find a tentative release date for 3.2.0. Do you have that
> information and if the date is set do you mind sharing that with me.
>

The best place to see the list of work targeted at Puppet 3.2.0 is at:
http://projects.puppetlabs.com/projects/puppet/roadmap#3.2.0

We released 3.2.0rc2 this week. If there are no new issues reported ande
introduced by the release of RC2 then we'll release Puppet 3.2.0
approximately 7 days after the release of RC2. As far as I know we haven't
had any reported RC introduced issues, so there's a pretty good chance
we'll release Puppet 3.2.0 sometime during the week of 13 May (next week).

Unfortunately I can't give a specific date, nor is this information I'm
providing authoritative. Eric Sorenson will make the final decision to cut
the release, but we're looking pretty good for next week.

Please keep an eye on the puppet-announce mailing list, which is one of the
places the release announcement will be published.

Hope this helps,
-Jeff

Revision history for this message
Adam Stokes (adam-stokes) wrote :

Jeff,

Thanks for the quick response. I'll make sure to monitor the mailing list.

Thanks again,
Adam

Revision history for this message
Adam Stokes (adam-stokes) wrote :

3.2.1 is out, once it makes it way into Debian and then Ubuntu archive I'll work on getting a possible backport accepted for Precise, Quantal and Raring.

Thanks
Adam

Revision history for this message
Adam Stokes (adam-stokes) wrote :

Puppet 3.2.2 is in Saucy now. Will see how feasible it is to just do a full backport into Precise.

Revision history for this message
Adam Stokes (adam-stokes) wrote :

I've started the backport process here: https://bugs.launchpad.net/precise-backports/+bug/1194901

If anyone is interested in testing out the packages on either Precise, Quantal, or Raring and provide feedback on that backport request it would be greatly appreciated! This will also help speed up the backport approval process.

Thank you
Adam

Revision history for this message
Colin Watson (cjwatson) wrote :

FWIW I don't think you should rely solely on backports for this; if a bug was introduced in -security then it should be fixed through the same channel.

Changed in puppet (Ubuntu Quantal):
status: New → Triaged
Changed in puppet (Ubuntu Raring):
status: New → Triaged
Changed in puppet (Ubuntu Quantal):
importance: Undecided → High
Changed in puppet (Ubuntu Raring):
importance: Undecided → High
Revision history for this message
Adam Stokes (adam-stokes) wrote :

Agreed, however, from previous discussions with the maintainers I was under the impression this wouldn't be a trivial fix for 2.7.x.

Jeff,

Could you comment on that?

Thanks
Adam

Revision history for this message
Peter Matulis (petermatulis) wrote :

I see that the backport request for Precise, Quantal, and Raring has been rejected. Where do we stand with this bug?

Revision history for this message
Jeff McCune (jeff-puppetlabs) wrote :

> Could you comment on that?

It's not a trivial fix for 2.7.x. Sorry for the late reply.

-Jeff

Revision history for this message
Rolf Leggewie (r0lf) wrote :

quantal has seen the end of its life and is no longer receiving any updates. Marking the quantal task for this ticket as "Won't Fix".

Changed in puppet (Ubuntu Quantal):
status: Triaged → Won't Fix
Revision history for this message
Rolf Leggewie (r0lf) wrote :

raring has seen the end of its life and is no longer receiving any updates. Marking the raring task for this ticket as "Won't Fix".

Changed in puppet (Ubuntu Raring):
status: Triaged → Won't Fix
Revision history for this message
Mathew Hodson (mhodson) wrote :

Fixed in Puppet 3.2.0

tags: added: precise regression-update
Changed in puppet (Ubuntu):
status: Triaged → Fix Released
Revision history for this message
Steve Langasek (vorlon) wrote :

The Precise Pangolin has reached end of life, so this bug will not be fixed for that release

Changed in puppet (Ubuntu Precise):
status: Triaged → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.