| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0187: Updated puppet packages fix
remote code execution vulnerability |
| Date: |
| Wed, 26 Jun 2013 20:36:34 +0200 |
| Message-ID: |
| <20130626183634.4C4B242594@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0187 - Updated puppet packages fix remote code execution vulnerability
Publication date: 26 Jun 2013
URL: http://advisories.mageia.org/MGASA-2013-0187.html
Type: security
Affected Mageia releases: 2, 3
CVE: CVE-2013-3567
Description:
When making REST api calls, the puppet master takes YAML from an untrusted
client, deserializes it, and then calls methods on the resulting object.
A YAML payload can be crafted to cause the deserialization to construct
an instance of any class available in the ruby process, which allows an
attacker to execute code contained in the payload.
References:
- http://puppetlabs.com/security/cve/cve-2013-3567/
- http://www.ubuntu.com/usn/usn-1886-1/
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567
SRPMS:
- 3/core/puppet-2.7.22-1.mga3
- 3/core/puppet3-3.2.2-1.mga3
- 2/core/puppet-2.7.22-1.mga2
(
Log in to post comments)