RHSA-2008:0566
Vulnerability from csaf_redhat - Published: 2008-07-21 19:16 - Updated: 2026-01-13 22:35Summary
Red Hat Security Advisory: rhpki-util, rhpki-common, and rhpki-ca security and bug fix update
Notes
Topic
Updated rhpki-util, rhpki-common, and rhpki-ca packages that fix a security
issue and several bugs are now available for Red Hat Certificate System
7.3.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Red Hat Certificate System (RHCS) is an enterprise software system designed
to manage enterprise Public Key Infrastructure (PKI) deployments.
It was discovered that new revocations, performed while a Certificate
Revocation List (CRL) was being generated, could potentially cause revoked
certificates at the upper end of the serial number range to not appear on
the CRL for a period of time. A user who has a revoked but otherwise valid
certificate could take advantage of this issue and bypass the revocation
list; however, in practice, they would have no way of influencing which
revoked certificate entries were missing or the time period.
(CVE-2007-4994)
As well, these updated packages fix the following bugs:
* due to a regression, signing a CRL with approximately 150,000 records may
have taken up to five minutes. In these updated packages, signing such CRLs
takes approximately twenty seconds.
* a bug, which resulted in a 404 error, due to servers not handling Online
Certificate Status Protocol (OCSP) requests in the GET method, has been
resolved. This issue may have caused a system to use 100% CPU. As well,
OCSP requests are now logged to the debug log file.
* it was possible for a CRL update to run at the same time as a certificate
status update. Now, CRL updating locks out the certificate status update
thread.
* inefficient LDAP search methods caused LDAP searches for a large number
of revoked certificates to take up to twenty minutes or more for 100,000
certificates during CRL generation. The LDAP search method has been
modified to greatly improve LDAP search times.
* the default OCSP verification path has changed since RHCS 7.1. These
updated packages add support for certificates that use the old
AuthorityInfoAccess (AIA) URL.
* an OCSP client submitting an OCSP request via the GET method may have
caused a "NullPointerException".
* if an agent automatically approved a certificate signing request (CSR),
using AgentCertAuth, the resultant certificate contained blank Subject Alt
Name extension fields. A manual enrollment by the same agent produced a
certificate with the correct number of Subject Alt Names and no blank
entries. With this update, automated enrollments via AgentCertAuth do not
have blank fields in issued certificates.
Users of Red Hat Certificate System should upgrade to these updated
packages, which resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated rhpki-util, rhpki-common, and rhpki-ca packages that fix a security\nissue and several bugs are now available for Red Hat Certificate System\n7.3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is an enterprise software system designed\nto manage enterprise Public Key Infrastructure (PKI) deployments.\n\nIt was discovered that new revocations, performed while a Certificate\nRevocation List (CRL) was being generated, could potentially cause revoked\ncertificates at the upper end of the serial number range to not appear on\nthe CRL for a period of time. A user who has a revoked but otherwise valid\ncertificate could take advantage of this issue and bypass the revocation\nlist; however, in practice, they would have no way of influencing which\nrevoked certificate entries were missing or the time period.\n(CVE-2007-4994)\n\nAs well, these updated packages fix the following bugs:\n\n* due to a regression, signing a CRL with approximately 150,000 records may\nhave taken up to five minutes. In these updated packages, signing such CRLs\ntakes approximately twenty seconds.\n\n* a bug, which resulted in a 404 error, due to servers not handling Online\nCertificate Status Protocol (OCSP) requests in the GET method, has been\nresolved. This issue may have caused a system to use 100% CPU. As well,\nOCSP requests are now logged to the debug log file.\n\n* it was possible for a CRL update to run at the same time as a certificate\nstatus update. Now, CRL updating locks out the certificate status update\nthread.\n\n* inefficient LDAP search methods caused LDAP searches for a large number\nof revoked certificates to take up to twenty minutes or more for 100,000\ncertificates during CRL generation. The LDAP search method has been\nmodified to greatly improve LDAP search times.\n\n* the default OCSP verification path has changed since RHCS 7.1. These\nupdated packages add support for certificates that use the old\nAuthorityInfoAccess (AIA) URL.\n\n* an OCSP client submitting an OCSP request via the GET method may have\ncaused a \"NullPointerException\".\n\n* if an agent automatically approved a certificate signing request (CSR),\nusing AgentCertAuth, the resultant certificate contained blank Subject Alt\nName extension fields. A manual enrollment by the same agent produced a\ncertificate with the correct number of Subject Alt Names and no blank\nentries. With this update, automated enrollments via AgentCertAuth do not\nhave blank fields in issued certificates.\n\nUsers of Red Hat Certificate System should upgrade to these updated\npackages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0566",
"url": "https://access.redhat.com/errata/RHSA-2008:0566"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "304571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=304571"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0566.json"
}
],
"title": "Red Hat Security Advisory: rhpki-util, rhpki-common, and rhpki-ca security and bug fix update",
"tracking": {
"current_release_date": "2026-01-13T22:35:17+00:00",
"generator": {
"date": "2026-01-13T22:35:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2008:0566",
"initial_release_date": "2008-07-21T19:16:00+00:00",
"revision_history": [
{
"date": "2008-07-21T19:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-21T15:16:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:35:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4AS",
"product": {
"name": "Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4ES",
"product": {
"name": "Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-util-0:7.3.0-18.el4.noarch",
"product": {
"name": "rhpki-util-0:7.3.0-18.el4.noarch",
"product_id": "rhpki-util-0:7.3.0-18.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-util@7.3.0-18.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ca-0:7.3.0-11.el4.noarch",
"product": {
"name": "rhpki-ca-0:7.3.0-11.el4.noarch",
"product_id": "rhpki-ca-0:7.3.0-11.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ca@7.3.0-11.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-common-0:7.3.0-34.el4.noarch",
"product": {
"name": "rhpki-common-0:7.3.0-34.el4.noarch",
"product_id": "rhpki-common-0:7.3.0-34.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-common@7.3.0-34.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-11.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-11.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-common-0:7.3.0-34.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch"
},
"product_reference": "rhpki-common-0:7.3.0-34.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-util-0:7.3.0-18.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch"
},
"product_reference": "rhpki-util-0:7.3.0-18.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-11.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-11.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-common-0:7.3.0-34.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch"
},
"product_reference": "rhpki-common-0:7.3.0-34.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-util-0:7.3.0-18.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch"
},
"product_reference": "rhpki-util-0:7.3.0-18.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4994",
"discovery_date": "2007-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "304571"
}
],
"notes": [
{
"category": "description",
"text": "Certificate Server 7.2 in Red Hat Certificate System (RHCS) does not properly handle new revocations that occur while a Certificate Revocation List (CRL) is being generated, which might prevent certain revoked certificates from appearing on the CRL quickly and allow users with revoked certificates to bypass the intended CRL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rhcs CRL can get corrupted",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch",
"4AS-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch",
"4AS-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch",
"4ES-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch",
"4ES-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4994"
},
{
"category": "external",
"summary": "RHBZ#304571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=304571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4994",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4994"
}
],
"release_date": "2007-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-21T19:16:00+00:00",
"details": "Users running Red Hat Certificate System on Red Hat Enterprise Linux:\n\nBefore applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188\n\nUsers running Red Hat Certificate System on Sun Solaris:\n\nUpdated Solaris packages in .pkg format are available in the Red Hat\nCertificate System Solaris channels on the Red Hat Network. These packages\nshould be installed/upgraded using Solaris native package management tools.\n\nRefer to the Red Hat Certificate System Administration Guide for\ninstallation instructions: http://www.redhat.com/docs/manuals/cert-system/",
"product_ids": [
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch",
"4AS-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch",
"4AS-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-11.el4.noarch",
"4ES-CERT-7.3:rhpki-common-0:7.3.0-34.el4.noarch",
"4ES-CERT-7.3:rhpki-util-0:7.3.0-18.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0566"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rhcs CRL can get corrupted"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…