Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 742649 - (CVE-2011-3871) CVE-2011-3871 puppet: predictable temporary file using RAL
CVE-2011-3871 puppet: predictable temporary file using RAL
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20110930,repor...
: Security
Depends On: 742654 742655
Blocks: 742180 748458
  Show dependency treegraph
 
Reported: 2011-09-30 18:07 EDT by Vincent Danen
Modified: 2014-11-20 15:03 EST (History)
6 users (show)

See Also:
Fixed In Version: puppet 2.6.11, puppet 2.7.5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-07-04 02:50:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
patch from upstream for 2.6.x and 2.7.x (2.55 KB, patch)
2011-09-30 19:21 EDT, Vincent Danen
no flags Details | Diff
patch from upstream for 0.25.x (2.73 KB, patch)
2011-09-30 19:21 EDT, Vincent Danen
no flags Details | Diff

  None (edit)
Description Vincent Danen 2011-09-30 18:07:55 EDT
A flaw was found in the way puppet resource in --edit mode handled temporary files.  It would use an extremely predictable file name which persisted and could be known well prior to creation.  This could result in both editing an arbitrary target file, and tricking puppet into running that arbitrary file as the invoking user.  This is feature is typically used as the root user, as you cannot do much as a less privileged user.

This is corrected in upstream 2.6.11 and 2.7.5 releases.
Comment 1 Vincent Danen 2011-09-30 19:21:02 EDT
Created attachment 525849 [details]
patch from upstream for 2.6.x and 2.7.x
Comment 2 Vincent Danen 2011-09-30 19:21:21 EDT
Created attachment 525850 [details]
patch from upstream for 0.25.x
Comment 3 Vincent Danen 2011-09-30 19:36:50 EDT
Created puppet tracking bugs for this issue

Affects: fedora-all [bug 742654]
Affects: epel-all [bug 742655]
Comment 4 Fedora Update System 2011-10-24 11:39:43 EDT
puppet-0.25.5-2.el4 has been pushed to the Fedora EPEL 4 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 5 Kurt Seifried 2012-04-11 12:18:06 EDT
Resolved in Puppet 2.7.5 and 2.6.11, CloudForms ships Puppet 2.6.14.
Comment 6 Tomas Hoger 2012-07-04 02:50:11 EDT
Fixed upstream in 2.7.5 and 2.6.11.

External Reference:

http://puppetlabs.com/security/cve/cve-2011-3871/

Note You need to log in before you can comment on or make changes to this bug.