SUSE-SU-2018:0600-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:0600-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:0600-1
Related
Published
2018-03-05T09:43:31Z
Modified
2018-03-05T09:43:31Z
Summary
Security update for puppet
Details

This update for puppet fixes the following issues:

  • CVE-2017-2295: Fixed a security vulnerability where an attacker could force YAML deserialization in an unsafe manner, which would lead to remote code execution.

In default, this update would break a backwards compatibility with Puppet agents older than 3.2.2 as the SLE11 master doesn't support other fact formats than pson in default anymore. In order to allow users to continue using their SLE11 agents a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option 'dangerousfactformats' was added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set to false, only PSON fact format is accepted. (bsc#1040151), (bsc#1077767)

References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / puppet

Package

Name
puppet
Purl
purl:rpm/suse/puppet&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.26-0.5.3.1

Ecosystem specific

{
    "binaries": [
        {
            "puppet": "2.7.26-0.5.3.1",
            "puppet-server": "2.7.26-0.5.3.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / puppet

Package

Name
puppet
Purl
purl:rpm/suse/puppet&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.26-0.5.3.1

Ecosystem specific

{
    "binaries": [
        {
            "puppet": "2.7.26-0.5.3.1",
            "puppet-server": "2.7.26-0.5.3.1"
        }
    ]
}