<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ruby2.2-rubygem-puppet-3.8.7-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10581</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ruby2.2-rubygem-puppet-3.8.7-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ruby2.2-rubygem-puppet-3.8.7-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10581</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10581</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3848/</URL>
      <Description>SUSE CVE CVE-2011-3848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3872/</URL>
      <Description>SUSE CVE CVE-2011-3872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3864/</URL>
      <Description>SUSE CVE CVE-2012-3864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3865/</URL>
      <Description>SUSE CVE CVE-2012-3865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3866/</URL>
      <Description>SUSE CVE CVE-2012-3866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3867/</URL>
      <Description>SUSE CVE CVE-2012-3867 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3567/</URL>
      <Description>SUSE CVE CVE-2013-3567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4761/</URL>
      <Description>SUSE CVE CVE-2013-4761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4956/</URL>
      <Description>SUSE CVE CVE-2013-4956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3248/</URL>
      <Description>SUSE CVE CVE-2014-3248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3253/</URL>
      <Description>SUSE CVE CVE-2014-3253 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-puppet-3.8.7-2.2">
      <FullProductName ProductID="ruby2.2-rubygem-puppet-3.8.7-2.2">ruby2.2-rubygem-puppet-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-puppet-doc-3.8.7-2.2">
      <FullProductName ProductID="ruby2.2-rubygem-puppet-doc-3.8.7-2.2">ruby2.2-rubygem-puppet-doc-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2">
      <FullProductName ProductID="ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2">ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-puppet-3.8.7-2.2">
      <FullProductName ProductID="ruby2.3-rubygem-puppet-3.8.7-2.2">ruby2.3-rubygem-puppet-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-puppet-doc-3.8.7-2.2">
      <FullProductName ProductID="ruby2.3-rubygem-puppet-doc-3.8.7-2.2">ruby2.3-rubygem-puppet-doc-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2">
      <FullProductName ProductID="ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2">ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-puppet-3.8.7-2.2">
      <FullProductName ProductID="rubygem-puppet-3.8.7-2.2">rubygem-puppet-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-puppet-emacs-3.8.7-2.2">
      <FullProductName ProductID="rubygem-puppet-emacs-3.8.7-2.2">rubygem-puppet-emacs-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-puppet-master-3.8.7-2.2">
      <FullProductName ProductID="rubygem-puppet-master-3.8.7-2.2">rubygem-puppet-master-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-puppet-master-unicorn-3.8.7-2.2">
      <FullProductName ProductID="rubygem-puppet-master-unicorn-3.8.7-2.2">rubygem-puppet-master-unicorn-3.8.7-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-puppet-vim-3.8.7-2.2">
      <FullProductName ProductID="rubygem-puppet-vim-3.8.7-2.2">rubygem-puppet-vim-3.8.7-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.2-rubygem-puppet-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2">ruby2.2-rubygem-puppet-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-puppet-doc-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2">ruby2.2-rubygem-puppet-doc-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2">ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-puppet-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2">ruby2.3-rubygem-puppet-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-puppet-doc-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2">ruby2.3-rubygem-puppet-doc-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2">ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-puppet-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2">rubygem-puppet-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-puppet-emacs-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2">rubygem-puppet-emacs-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-puppet-master-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2">rubygem-puppet-master-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-puppet-master-unicorn-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2">rubygem-puppet-master-unicorn-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-puppet-vim-3.8.7-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2">rubygem-puppet-vim-3.8.7-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.</Note>
    </Notes>
    <CVE>CVE-2011-3848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3848.html</URL>
        <Description>CVE-2011-3848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/721139</URL>
        <Description>SUSE Bug 721139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726372</URL>
        <Description>SUSE Bug 726372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."</Note>
    </Notes>
    <CVE>CVE-2011-3872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3872.html</URL>
        <Description>CVE-2011-3872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726372</URL>
        <Description>SUSE Bug 726372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.</Note>
    </Notes>
    <CVE>CVE-2012-3864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3864.html</URL>
        <Description>CVE-2012-3864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770828</URL>
        <Description>SUSE Bug 770828</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.</Note>
    </Notes>
    <CVE>CVE-2012-3865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3865.html</URL>
        <Description>CVE-2012-3865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770829</URL>
        <Description>SUSE Bug 770829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.</Note>
    </Notes>
    <CVE>CVE-2012-3866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3866.html</URL>
        <Description>CVE-2012-3866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770827</URL>
        <Description>SUSE Bug 770827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.</Note>
    </Notes>
    <CVE>CVE-2012-3867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3867.html</URL>
        <Description>CVE-2012-3867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770833</URL>
        <Description>SUSE Bug 770833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.</Note>
    </Notes>
    <CVE>CVE-2013-3567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3567.html</URL>
        <Description>CVE-2013-3567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040151</URL>
        <Description>SUSE Bug 1040151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/825878</URL>
        <Description>SUSE Bug 825878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880224</URL>
        <Description>SUSE Bug 880224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service.  NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.</Note>
    </Notes>
    <CVE>CVE-2013-4761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4761.html</URL>
        <Description>CVE-2013-4761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/835122</URL>
        <Description>SUSE Bug 835122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836962</URL>
        <Description>SUSE Bug 836962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880224</URL>
        <Description>SUSE Bug 880224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.</Note>
    </Notes>
    <CVE>CVE-2013-4956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4956.html</URL>
        <Description>CVE-2013-4956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/835122</URL>
        <Description>SUSE Bug 835122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/835123</URL>
        <Description>SUSE Bug 835123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836962</URL>
        <Description>SUSE Bug 836962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.</Note>
    </Notes>
    <CVE>CVE-2014-3248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3248.html</URL>
        <Description>CVE-2014-3248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879913</URL>
        <Description>SUSE Bug 879913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2014-3253</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-doc-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-puppet-testsuite-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-emacs-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-master-unicorn-3.8.7-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-puppet-vim-3.8.7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3253.html</URL>
        <Description>CVE-2014-3253</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
