Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure the Private Keys corresponding to SSL Certificates used by the HTTP daemon #737

Merged
merged 3 commits into from
Nov 29, 2023

Conversation

gtrentalancia
Copy link
Contributor

@gtrentalancia gtrentalancia commented Nov 19, 2023

Secure the Private Keys corresponding to SSL Certificates used by the HTTP daemon in order to fix a serious Information Disclosure vulnerability caused by the erroneous labeling of TLS Private Keys and CSR.

The new file contexts are based upon the official Apache HTTP Server recommended locations (see http://www.apache.com/how-to-setup-an-ssl-certificate-on-apache), have been extended to Debian and Gentoo locations, but might need to be further customized for other possible file locations which might still be exposed to the vulnerability.

RedHat distributions are not affected by this issue, thanks to cc91fed but apparentlly such change was not taken up by other distributions file contexts specifications.

Fixes: #735

Replaces: #733

Also fixes the certmonger module so that it can manage the above mentioned secret files.

Apache HTTP server according to the default locations:

 http://www.apache.com/how-to-setup-an-ssl-certificate-on-apache

Add the correct TLS Private Keys file label for Debian
systems.

This patch fixes a serious Information Disclosure
vulnerability caused by the erroneous labeling of
TLS Private Keys and CSR, as explained above.

See: SELinuxProject#735

Signed-off-by: Guido Trentalancia <[email protected]>
---
 policy/modules/system/miscfiles.fc |    3 +++
 1 file changed, 3 insertions(+)
SSL Certificates used by the HTTP daemon.

Signed-off-by: Guido Trentalancia <[email protected]>
---
 policy/modules/roles/webadm.te |    4 ++++
 1 file changed, 4 insertions(+)
and CSR used for example by the HTTP and/or Mail
Transport daemons.

Signed-off-by: Guido Trentalancia <[email protected]>
---
 policy/modules/services/certmonger.te |    3 +++
 1 file changed, 3 insertions(+)
@pebenito pebenito merged commit 17c7421 into SELinuxProject:main Nov 29, 2023
56 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Information Disclosure vulnerability related to SSL Private Keys and CSR used by the HTTP daemon
2 participants