Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 11 Jul 2012 15:38:30 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Moses Mendoza <moses@...petlabs.com>
Subject: Re: Re: Fwd: New Security Vulnerabilities in Puppet

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/11/2012 12:04 PM, Kurt Seifried wrote:
> On 07/11/2012 10:37 AM, Moses Mendoza wrote:
>>>> 
>>>> Vulnerability 5 Agents with certnames of IP addresses can be 
>>>> impersonated (low) *Affected Versions: 2.7.x, 2.6.x If an 
>>>> authenticated host with a certname of an IP address changes
>>>> IP addresses, and a second host assumes the first host's
>>>> former IP address, the second host will be treated by the
>>>> puppet master as the first one, giving the second host access
>>>> to the first host's catalog. Note: This will not be fixed in
>>>> Puppet versions prior to the forthcoming 3.x. Instead, with
>>>> this announcement IP-based authentication in Puppet < 3.x is 
>>>> deprecated.
> 
> After some further communications with them it has been decided to 
> assign this issue a CVE. Please use CVE-2012-3408 for this issue.
> 
> Moses: can you confirm that a CVE page with links to the code 
> commits/etc will be created? Thanks.

Excellent: http://puppetlabs.com/security/cve/cve-2012-3408/

Thanks!


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=eQVt
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.