Otkrivena su tri sigurnosna propusta u radu programskog paketa Puppet, namijenjenog operacijskim sustavima Fedora 15 i 16. Lokalnim napadačima omogućuju izvođenje DoS napada, otkrivanje osjetljivih informacija te pokretanje proizvoljnih naredbi ljuske.
Paket: | puppet 2.x |
Operacijski sustavi: | Fedora 15, Fedora 16 |
Kritičnost: | 4.7 |
Problem: | pogreška u programskoj komponenti |
Iskorištavanje: | lokalno |
Posljedica: | otkrivanje osjetljivih informacija, pokretanje proizvoljnih naredbi, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-1986, CVE-2012-1987, CVE-2012-1988 |
Izvorni ID preporuke: | FEDORA-2012-6055 |
Izvor: | Fedora |
Problem: | |
Propusti su posljedica pogrešaka u rukovanju određenim zahtjevima te objektom "Puppet::FileBucket::File". |
|
Posljedica: | |
Napadač ih može iskoristiti za izvođenje DoS napada, otkrivanje osjetljivih informacija i pokretanje proizvoljnih naredbi ljuske. |
|
Rješenje: | |
Korisnicima se preporuča instalacija odgovarajućih zakrpa. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-6055
2012-04-18 19:05:59
--------------------------------------------------------------------------------
Name : puppet
Product : Fedora 15
Version : 2.6.16
Release : 1.fc15
URL : http://puppetlabs.com
Summary : A network tool for managing many disparate systems
Description :
Puppet lets you centrally manage every important aspect of your system using a
cross-platform specification language that manages all the separate elements
normally aggregated in different files, like users, cron jobs, and hosts,
along with obviously discrete elements like packages, services, and files.
--------------------------------------------------------------------------------
Update Information:
This update fixes several security issues recently found in puppet related to
filebucket functionality. For full details, refer to the upstream release
notes:
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 11 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.16-1
- Update to 2.6.16, fixes CVE-2012-1986, CVE-2012-1987, and CVE-2012-1988
- Correct permissions of /var/log/puppet (0750)
* Wed Feb 22 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.14-1
- Update to 2.6.14, fixes CVE-2012-1053 and CVE-2012-1054
* Mon Feb 13 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-3
- Move rpmlint fixes to %prep, add a few additional fixes
- Bump minimum ruby version to 1.8.5 now that EL-4 is all but dead
- Update install locations for Fedora-17 / Ruby-1.9
- Use ruby($lib) for augeas and shadow requirements
- Only try to run 0.25.x -> 2.6.x pid file updates on EL
* Thu Jan 5 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-2
- Revert to minimal patch for augeas >= 0.10 (bz#771097)
* Wed Dec 14 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-1
- Update to 2.6.13
- Cherry-pick various augeas fixes from upstream (bz#771097)
* Sun Oct 23 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.12-1
- Update to 2.6.12, fixes CVE-2011-3872
- Add upstream patch to restore Mongrel XMLRPC functionality (upstream #10244)
- Apply partial fix for upstream #9167 (tagmail report sends email when nothing
happens)
* Thu Sep 29 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.6-3
- Apply upstream patches for CVE-2011-3869, CVE-2011-3870, CVE-2011-3871, and
upstream #9793
* Tue Sep 27 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.6-2
- Apply upstream patch for CVE-2011-3848
* Wed Mar 16 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.6-1
- Update to 2.6.6
- Ensure %pre exits cleanly
- Fix License tag, puppet is now GPLv2 only
- Create and own /usr/share/puppet/modules (#615432)
- Properly restart puppet agent/master daemons on upgrades from 0.25.x
- Require libselinux-utils when selinux support is enabled
- Support tmpfiles.d for Fedora >= 15 (#656677)
- Apply a few upstream fixes for 0.25.5 regressions
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #810069 - CVE-2012-1986 puppet: Filebucket arbitrary file read
https://bugzilla.redhat.com/show_bug.cgi?id=810069
[ 2 ] Bug #810070 - CVE-2012-1987 puppet: Filebucket denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=810070
[ 3 ] Bug #810071 - CVE-2012-1988 puppet: Filebucket arbitrary code execution
https://bugzilla.redhat.com/show_bug.cgi?id=810071
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update puppet' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-5999
2012-04-18 19:03:28
--------------------------------------------------------------------------------
Name : puppet
Product : Fedora 16
Version : 2.6.16
Release : 1.fc16
URL : http://puppetlabs.com
Summary : A network tool for managing many disparate systems
Description :
Puppet lets you centrally manage every important aspect of your system using a
cross-platform specification language that manages all the separate elements
normally aggregated in different files, like users, cron jobs, and hosts,
along with obviously discrete elements like packages, services, and files.
--------------------------------------------------------------------------------
Update Information:
This update fixes several security issues recently found in puppet related to
filebucket functionality. For full details, refer to the upstream release
notes:
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 11 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.16-1
- Update to 2.6.16, fixes CVE-2012-1986, CVE-2012-1987, and CVE-2012-1988
- Correct permissions of /var/log/puppet (0750)
* Wed Feb 22 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.14-1
- Update to 2.6.14, fixes CVE-2012-1053 and CVE-2012-1054
* Mon Feb 13 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-3
- Move rpmlint fixes to %prep, add a few additional fixes
- Bump minimum ruby version to 1.8.5 now that EL-4 is all but dead
- Update install locations for Fedora-17 / Ruby-1.9
- Use ruby($lib) for augeas and shadow requirements
- Only try to run 0.25.x -> 2.6.x pid file updates on EL
* Thu Jan 5 2012 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-2
- Revert to minimal patch for augeas >= 0.10 (bz#771097)
* Wed Dec 14 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.13-1
- Update to 2.6.13
- Cherry-pick various augeas fixes from upstream (bz#771097)
* Sun Oct 23 2011 Todd Zullinger <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.12-1
- Update to 2.6.12, fixes CVE-2011-3872
- Add upstream patch to restore Mongrel XMLRPC functionality (upstream #10244)
- Apply partial fix for upstream #9167 (tagmail report sends email when nothing
happens)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #810069 - CVE-2012-1986 puppet: Filebucket arbitrary file read
https://bugzilla.redhat.com/show_bug.cgi?id=810069
[ 2 ] Bug #810070 - CVE-2012-1987 puppet: Filebucket denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=810070
[ 3 ] Bug #810071 - CVE-2012-1988 puppet: Filebucket arbitrary code execution
https://bugzilla.redhat.com/show_bug.cgi?id=810071
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update puppet' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke