[Pkg-puppet-devel] Bug#866711: mcollective: CVE-2017-2292: Remote code execution via YAML deserialization

Salvatore Bonaccorso carnil at debian.org
Sat Jul 1 06:46:13 UTC 2017


Source: mcollective
Version: 2.6.0+dfsg-2.1
Severity: grave
Tags: patch security upstream

Hi,

the following vulnerability was published for mcollective.

CVE-2017-2292[0]:
| Versions of MCollective prior to 2.10.4 deserialized YAML from agents
| without calling safe_load, allowing the potential for arbitrary code
| execution on the server. The fix for this is to call YAML.safe_load on
| input. This has been tested in all Puppet-supplied MCollective
| plugins, but there is a chance that third-party plugins could rely on
| this insecure behavior.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-2292
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2292
[1] https://puppet.com/security/cve/cve-2017-2292
[2] https://github.com/puppetlabs/marionette-collective/commit/e0e741889f5adeb8f75387037106b0d28a9099b0

Regards,
Salvatore



More information about the Pkg-puppet-devel mailing list