Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 742645 - (CVE-2011-3869) CVE-2011-3869 puppet: K5login content attack
CVE-2011-3869 puppet: K5login content attack
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20110930,repor...
: Security
Depends On: 742654 742655
Blocks: 742180 748458
  Show dependency treegraph
 
Reported: 2011-09-30 17:33 EDT by Vincent Danen
Modified: 2012-12-05 04:18 EST (History)
6 users (show)

See Also:
Fixed In Version: puppet 2.6.11, puppet 2.7.5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-07-04 02:51:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
patch from upstream for 2.6.x and 2.7.x (1.40 KB, patch)
2011-09-30 19:18 EDT, Vincent Danen
no flags Details | Diff
patch from upstream for 0.25.x (1.44 KB, patch)
2011-09-30 19:19 EDT, Vincent Danen
no flags Details | Diff

  None (edit)
Description Vincent Danen 2011-09-30 17:33:20 EDT
A flaw was found in the way puppet handled the k5login type.  The k5login type is typically used to manage a file in the home directory of a user.  It would write to the target file, as root, without doing anything to secure the file.  This would allow the owner of the home directory to symlink to anything on the system, and have the contents replaced, as root.

This is corrected in upstream 2.6.11 and 2.7.5 releases.
Comment 1 Vincent Danen 2011-09-30 19:18:33 EDT
Created attachment 525847 [details]
patch from upstream for 2.6.x and 2.7.x
Comment 2 Vincent Danen 2011-09-30 19:19:19 EDT
Created attachment 525848 [details]
patch from upstream for 0.25.x
Comment 3 Vincent Danen 2011-09-30 19:36:20 EDT
Created puppet tracking bugs for this issue

Affects: fedora-all [bug 742654]
Affects: epel-all [bug 742655]
Comment 4 Fedora Update System 2011-10-24 11:39:36 EDT
puppet-0.25.5-2.el4 has been pushed to the Fedora EPEL 4 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 5 Kurt Seifried 2012-04-11 12:17:55 EDT
Resolved in Puppet 2.7.5 and 2.6.11, CloudForms ships Puppet 2.6.14.
Comment 6 Tomas Hoger 2012-07-04 02:51:35 EDT
Fixed upstream in 2.7.5 and 2.6.11.

External Reference:

http://puppetlabs.com/security/cve/cve-2011-3869/

Note You need to log in before you can comment on or make changes to this bug.