LWN.net Logo

Mageia alert MGASA-2013-0187 (puppet)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0187: Updated puppet packages fix remote code execution vulnerability
Date:  Wed, 26 Jun 2013 20:36:34 +0200
Message-ID:  <20130626183634.4C4B242594@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0187 - Updated puppet packages fix remote code execution vulnerability Publication date: 26 Jun 2013 URL: http://advisories.mageia.org/MGASA-2013-0187.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-3567 Description: When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the deserialization to construct an instance of any class available in the ruby process, which allows an attacker to execute code contained in the payload. References: - http://puppetlabs.com/security/cve/cve-2013-3567/ - http://www.ubuntu.com/usn/usn-1886-1/ - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567 SRPMS: - 3/core/puppet-2.7.22-1.mga3 - 3/core/puppet3-3.2.2-1.mga3 - 2/core/puppet-2.7.22-1.mga2


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds