HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the roles CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vault | Hashicorp | * | 1.9.10 (excluding) |
Vault | Hashicorp | 1.10.0 (including) | 1.10.7 (excluding) |
Vault | Hashicorp | 1.11.0 (including) | 1.11.4 (excluding) |
Red Hat OpenShift Container Platform 4.12 | RedHat | openshift4/ose-installer:v4.12.0-202301090455.p0.gba94031.assembly.stream | * |
Red Hat OpenShift Container Platform 4.13 | RedHat | openshift4/ose-installer:v4.13.0-202305091542.p0.g44db7b2.assembly.stream | * |
RHODF-4.13-RHEL-9 | RedHat | odf4/mcg-rhel9-operator:v4.13.0-41 | * |
RHODF-4.13-RHEL-9 | RedHat | odf4/rook-ceph-rhel9-operator:v4.13.0-70 | * |