Upstream information

CVE-2012-1986 at MITRE

Description

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a symlink attack in conjunction with a crafted REST request for a file in a filebucket.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:N/AC:H/Au:S/C:P/I:N/A:N
Access Vector Network
Access Complexity High
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 755872 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • puppet >= 2.6.12-0.14.1
  • puppet-server >= 2.6.12-0.14.1
Patchnames:
slessp1-puppet
SUSE Linux Enterprise Server 11 SP2
  • puppet >= 2.6.12-0.14.1
  • puppet-server >= 2.6.12-0.14.1
Patchnames:
slessp1-puppet
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
  • puppet >= 2.6.12-0.14.1
Builds
SAT Patch Nr: 6115
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP2
  • puppet >= 2.6.12-0.14.1
  • puppet-server >= 2.6.12-0.14.1
Builds
SAT Patch Nr: 6115
openSUSE 11.4
  • puppet >= 2.6.16-4.23.1
  • puppet-server >= 2.6.16-4.23.1
Patchnames:
openSUSE-2012-369


Status of this issue by product and package

Product(s) Source package State
SUSE Linux Enterprise Desktop 11 SP1 puppet Released
SUSE Linux Enterprise Server 11 SP1 puppet Released
SUSE Linux Enterprise Server 11 SP1 LTSS puppet Released
SUSE Linux Enterprise Server for SAP AIO 11 SP1 puppet Released