It was found that Puppet will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML. External References: https://puppet.com/security/cve/cve-2017-2295
Created puppet tracking bugs for this issue: Affects: epel-7 [bug 1452653] Affects: fedora-all [bug 1452654] Affects: openshift-1 [bug 1452655]
Created puppet tracking bugs for this issue: Affects: openstack-rdo [bug 1460091]
This issue has been addressed in the following products: Red Hat Satellite 6.3 for RHEL 7 Via RHSA-2018:0336 https://access.redhat.com/errata/RHSA-2018:0336