Описание
Security update for puppet
This update for puppet fixes the following issues:
Security issue fixed:
- CVE-2017-2295: Possible code execution vulnerability where an attacker could force YAML deserialization in an unsafe manner. In default, this update breaks a backwards compatibility with Puppet agents older than 3.2.2 as the SLE12 master doesn't support other fact formats than pson in default anymore. In order to allow users to continue using their SLE12 master/SLE11 agents setup and fix CVE-2017-2295 for the others, a new puppet master boolean option 'dangerous_fact_formats' was added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set to false, only PSON fact format is accepted. (bsc#1040151)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
puppet-3.8.5-15.3.3
SUSE Linux Enterprise Desktop 12 SP3
puppet-3.8.5-15.3.3
SUSE Linux Enterprise Module for Advanced Systems Management 12
puppet-3.8.5-15.3.3
puppet-server-3.8.5-15.3.3
Ссылки
- Link for SUSE-SU-2017:2113-1
- E-Mail link for SUSE-SU-2017:2113-1
- SUSE Security Ratings
- SUSE Bug 1040151
- SUSE CVE CVE-2017-2295 page
Описание
Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:puppet-3.8.5-15.3.3
SUSE Linux Enterprise Desktop 12 SP3:puppet-3.8.5-15.3.3
SUSE Linux Enterprise Module for Advanced Systems Management 12:puppet-3.8.5-15.3.3
SUSE Linux Enterprise Module for Advanced Systems Management 12:puppet-server-3.8.5-15.3.3
Ссылки
- CVE-2017-2295
- SUSE Bug 1040151