Security update for puppet

Announcement ID: SUSE-SU-2018:0600-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2017-2295 ( SUSE ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2017-2295 ( NVD ): 8.2 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
  • SLES for SAP Applications 11-SP4
  • SUSE Linux Enterprise Server 11 SP4

An update that solves one vulnerability and has one security fix can now be installed.

Description:

This update for puppet fixes the following issues:

  • CVE-2017-2295: Fixed a security vulnerability where an attacker could force YAML deserialization in an unsafe manner, which would lead to remote code execution.

In default, this update would break a backwards compatibility with Puppet agents older than 3.2.2 as the SLE11 master doesn't support other fact formats than pson in default anymore. In order to allow users to continue using their SLE11 agents a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option "dangerous_fact_formats" was added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set to false, only PSON fact format is accepted. (bsc#1040151), (bsc#1077767)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 11 SP4
    zypper in -t patch slessp4-puppet-13498=1
  • SLES for SAP Applications 11-SP4
    zypper in -t patch slessp4-puppet-13498=1

Package List:

  • SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
    • puppet-server-2.7.26-0.5.3.1
    • puppet-2.7.26-0.5.3.1
  • SLES for SAP Applications 11-SP4 (ppc64 x86_64)
    • puppet-server-2.7.26-0.5.3.1
    • puppet-2.7.26-0.5.3.1

References: