Hide Forgot
From Matthaus Litteken <matthaus>: CVE-2012-1987 (Moderate) [#13552,#13553] - Filebucket denial of service By constructing a marshaled form of a Puppet::FileBucket::File object a user can cause it it to be written to any place on the disk of the puppet master. This could be used for a denial of service attach against the puppet master if an attacker fills a filesystem that can cause systems to stop working. In order to do this the attacker needs no access to the puppet master system, but does need access to agent SSL keys.
This is public now. External Reference: http://puppetlabs.com/security/cve/cve-2012-1987/
Created puppet tracking bugs for this issue Affects: fedora-all [bug 812955] Affects: epel-all [bug 812956]
Acknowledgements: Red Hat would like to thank Puppet Labs for reporting this issue.
puppet-2.6.16-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
puppet-2.6.16-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
puppet-2.6.16-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
puppet-2.6.16-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
puppet-2.7.13-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
(In reply to comment #0) > CVE-2012-1987 (Moderate) [#13552,#13553] http://projects.puppetlabs.com/issues/13552 http://projects.puppetlabs.com/issues/13553
This issue has been addressed in following products: CloudForms for RHEL 6 Via RHSA-2012:1542 https://rhn.redhat.com/errata/RHSA-2012-1542.html