Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 494768 (CVE-2013-4969) - <app-admin/puppet-{2.7.24,3.4.1} Insecure temporary file handling (CVE-2013-4969)
Summary: <app-admin/puppet-{2.7.24,3.4.1} Insecure temporary file handling (CVE-2013-4...
Status: RESOLVED FIXED
Alias: CVE-2013-4969
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 486002
Blocks:
  Show dependency tree
 
Reported: 2013-12-19 19:30 UTC by Matthew Marlowe (RETIRED)
Modified: 2014-02-02 18:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
patch 3.3.x (CVE-2013-4969-3.3.x-temp-file.patch,10.56 KB, patch)
2013-12-19 19:30 UTC, Matthew Marlowe (RETIRED)
no flags Details | Diff
2.7 patch (CVE-2013-4969-2.7.x-temp-file.patch,9.89 KB, patch)
2013-12-19 19:31 UTC, Matthew Marlowe (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Matthew Marlowe (RETIRED) gentoo-dev 2013-12-19 19:30:17 UTC
Created attachment 365698 [details, diff]
patch 3.3.x

Puppet Labs has become aware of a security vulnerability Puppet.

This vulnerability was discovered internally and has not been publicly
disclosed. We appreciate your consideration to the sensitivity of this
information, and respectfully ask that you refrain from publicly
disclosing the contents of this email until our planned disclosure
date, Thursday, December 26, 2013, UTC 18:00.

We have attached patches for the following versions of puppet in the
2.7.x and 3.3.x series:

* 2.7.x - CVE-2013-4969-2.7.x-temp-file.patch
* 3.3.x - CVE-2013-4969-3.3.x-temp-file.patch

While the Puppet 2.7.x series is officially end of life, a few brave
community members have offered to continue unofficial maintenance of
2.7.x for a short time. For this release, Sam Kottler has offered his
assistance applying the 2.7.x patch. If you require assistance with
the 2.7.x patch, please contact Sam Kottler at s@shk.io. Along with
Puppet 3.3.3, a "community" release of Puppet 2.7.24 will be issued on
our stated disclosure date.

If you have trouble with the 3.3.x patch, please let us know and we
will attempt to assist as much as possible.

# Vulnerability Summary #

CVE-2013-4969
Unsafe use of Temp files in File type (Local Privilege Escalation)
Assessed Risk Level: Medium

Puppet uses temp files unsafely by looking for a name it can use in a
directory, and then later writing to that file, creating a
vulnerability in which an attacker could make the name a symlink to
another file and thereby cause the puppet agent to overwrite something
that it did not intend to. The degree of difficulty to exploit this
vulnerability is high. We have not actually exploited this
vulnerability successfully.

# Commits in Fixes #
These commits will be in the 2.7.24 and 3.3.3 releases of Puppet, respectively.

2.7.24
======
691fbbe (#23343) Use `replace_file` to update a file's contents

3.3.3
======
2bcd29c (#23343) Use `replace_file` to update a file's contents


If you have any questions or need additional clarification, please
respond to distro-maintainers@puppetlabs.com

Thank you,
Moses Mendoza
Puppet Labs
Comment 1 Matthew Marlowe (RETIRED) gentoo-dev 2013-12-19 19:31:12 UTC
Created attachment 365700 [details, diff]
2.7 patch
Comment 2 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-12-26 20:34:21 UTC
ok, we need fast stablereqs open for the following

=app-admin/puppet-2.7.24 amd64 hppa ppc sparc x86
=app-admin/puppet-3.4.1 amd64 hppa sparc x86

I'd like puppet 3.4.1 to get stable for ppc as well so I can close bug 486002 as well :D
Comment 3 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-12-26 22:05:24 UTC
puppet is used for admin tasks very heavily (shipping passwd/shadow files isn't uncommon).  Because of this I am escalating this bug to B1.
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2013-12-27 16:09:30 UTC
Stable for HPPA.
Comment 5 Agostino Sarubbo gentoo-dev 2014-01-04 13:07:21 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-01-04 13:08:12 UTC
x86 stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-01-06 09:28:38 UTC
ppc stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-01-06 09:29:20 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2014-01-11 18:00:49 UTC
CVE-2013-4969 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4969):
  Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before
  2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files
  via a symlink attack on unspecified files.
Comment 10 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2014-01-27 08:32:56 UTC
removing myself from the cc list as I'm not needed here :D
Comment 11 Sergey Popov gentoo-dev 2014-02-02 18:26:57 UTC
Thanks for your work

GLSA vote: no
Comment 12 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-02-02 18:34:57 UTC
GLSA vote: no.

Closing as [noglsa]