Bug 996855 (CVE-2013-4956)

Summary: CVE-2013-4956 Puppet: Local Privilege Escalation/Arbitrary Code Execution
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, bdunne, bhu, bkearney, ccoleman, chrisw, dallan, dmcphers, esammons, gkotton, iboverma, jfrey, jialiu, jomara, jrafanie, jross, kseifried, lhh, lmeyer, markmc, matt, mcressma, obarenbo, rbryant, rhos-maint, sclewis, security-response-team, skottler, tkramer, williams, xlecauch, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: puppet 2.7.23, puppet 3.2.4 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-03-12 05:01:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 997615, 1002995, 1007062    
Bug Blocks: 997641    
Attachments:
Description Flags
2.7.22-puppet-Aug-2013-CVE-fixes.patc
none
3.2.3-puppet-Aug-2013-CVE-fixes.patch none

Description Kurt Seifried 2013-08-14 07:26:26 UTC
Moses Mendoza (moses) reports:

Puppet Module Tool does not control permissions of modules it
installs, instead transferring permissions that existed when the
module is built. This could allow a malicious user to write to modify
the puppet module if their local username is the same as the username
originally used to create the module and the user has write permission
to the puppet module directory.

Comment 1 Kurt Seifried 2013-08-14 07:34:01 UTC
Created attachment 786416 [details]
2.7.22-puppet-Aug-2013-CVE-fixes.patc

Comment 2 Kurt Seifried 2013-08-14 07:34:51 UTC
Comment on attachment 786416 [details]
2.7.22-puppet-Aug-2013-CVE-fixes.patc

This fixes CVE-2013-4956 and CVE-2013-4761

Comment 3 Kurt Seifried 2013-08-14 07:36:09 UTC
Created attachment 786419 [details]
3.2.3-puppet-Aug-2013-CVE-fixes.patch

This fixes CVE-2013-4956 and CVE-2013-4761

Comment 4 Vincent Danen 2013-08-15 19:20:10 UTC
External References:

http://puppetlabs.com/security/cve/cve-2013-4956/

Comment 5 Vincent Danen 2013-08-15 19:26:24 UTC
Created puppet tracking bugs for this issue:

Affects: fedora-all [bug 997615]

Comment 8 Sam Kottler 2013-08-30 12:26:55 UTC
I've pushed Puppet 3.2.4 to the F20 and rawhide repos which contains a fix for this issue.

Comment 12 Murray McAllister 2013-09-12 13:01:01 UTC
Acknowledgements:

Red Hat would like to thank Puppet Labs for reporting this issue.

Comment 13 errata-xmlrpc 2013-09-24 18:03:15 UTC
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2013:1283 https://rhn.redhat.com/errata/RHSA-2013-1283.html

Comment 14 errata-xmlrpc 2013-09-24 18:13:51 UTC
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2013:1284 https://rhn.redhat.com/errata/RHSA-2013-1284.html

Comment 15 Kurt Seifried 2014-03-12 05:01:54 UTC
This issue has been addressed in following products:

Fedora-all puppet 3.2.4-1 - Update to 3.2.4 to fix CVE-2013-4761 and CVE-2013-4956