Upstream information

CVE-2013-2274 at MITRE

Description

Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.5
Vector AV:N/AC:L/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 809839 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP2
  • puppet >= 2.6.18-0.4.2
Patchnames:
sledsp2-puppet
SUSE Linux Enterprise Server 11 SP2
  • puppet >= 2.6.18-0.4.2
  • puppet-server >= 2.6.18-0.4.2
Patchnames:
slessp2-puppet
SUSE Linux Enterprise Server for VMWare 11 SP2
  • puppet >= 2.6.18-0.4.2
  • puppet-server >= 2.6.18-0.4.2
Patchnames:
slessp2-puppet
SUSE Linux Enterprise Desktop 11 SP2
  • puppet >= 2.6.18-0.4.2
Builds
SAT Patch Nr: 7526
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
  • puppet >= 2.6.18-0.4.2
  • puppet-server >= 2.6.18-0.4.2
Builds
SAT Patch Nr: 7526
openSUSE 12.3
  • puppet >= 3.0.2-2.5.1
  • puppet-server >= 3.0.2-2.5.1
Patchnames:
openSUSE-2013-295


Status of this issue by product and package

Product(s) Source package State
SUSE Linux Enterprise Desktop 11 SP1 puppet Released
SUSE Linux Enterprise Desktop 11 SP2 puppet Released
SUSE Linux Enterprise Server 11 SP1 puppet Released
SUSE Linux Enterprise Server 11 SP1 LTSS puppet Released
SUSE Linux Enterprise Server 11 SP2 puppet Released
SUSE Linux Enterprise Server 11 SP2 LTSS puppet Released
SUSE Linux Enterprise Server for SAP AIO 11 SP1 puppet Released