Moses Mendoza
2013-Mar-12 17:33 UTC
Announce: Puppet 2.6.18 Available [ Security Release ]
Puppet 2.6.18 is now available. 2.6.18 addresses several security vulnerabilities discovered in the 2.6.x line of Puppet. These vulnerabilities have been assigned Mitre CVE numbers CVE-2013-1640, CVE-2013-1652, CVE-2013-1654, CVE-2013-2274, and CVE-2013-2275. All users of Puppet 2.6.17 and earlier who cannot upgrade to the current version of Puppet, 3.1.1, are strongly encouraged to upgrade to 2.6.18. For more information on these vulnerabilities, please visit http://puppetlabs.com/security, or visit http://puppetlabs.com/security/cve/cve-2013-1640, http://puppetlabs.com/security/cve/cve-2013-1652, http://puppetlabs.com/security/cve/cve-2013-1654, http://puppetlabs.com/security/cve/cve-2013-2274, and http://puppetlabs.com/security/cve/cve-2013-2275. Downloads are available at: * Source https://downloads.puppetlabs.com/puppet/puppet-2.6.18.tar.gz RPMs are available at https://yum.puppetlabs.com/el or /fedora Debs are available at https://apt.puppetlabs.com See the Verifying Puppet Download section at: https://projects.puppetlabs.com/projects/puppet/wiki/Downloading_Puppet Please report feedback via the Puppet Labs Redmine site, using an affected puppet version of 2.6.18: http://projects.puppetlabs.com/projects/puppet/ ## Changelog ## Andrew Parker (2): f45cd4b (#14093) Remove unsafe attributes from TemplateWrapper d9ad70a (#14093) Restore access to the filename in the template Daniel Pittman (2): 31dad7d (#8858) Refactor tests to use real HTTP objects 906ab92 (#8858) Explicitly set SSL peer verification mode. Jeff McCune (2): add9998 (#19151) Reject SSLv2 SSL handshakes and ciphers 16fce8e (#19531) (CVE-2013-2275) Only allow report save from the node matching the certname Josh Cooper (8): 7648de2 (#19391) Backport Request#remote? method 75a5f7e Run openssl from windows when trying to downgrade master e617728 Remove unnecessary rubygems require f07b761 Don''t assume puppetbindir is defined a11a690 Display SSL messages so we can match our regex bb288aa Don''t require openssl client to return 0 on failure f256c6d Don''t assume master supports SSLv2 b166c4f (#19391) Find the catalog for the specified node name Justin Stoller (2): b01c728 Acceptance tests for CVEs 2013 (1640, 1652, 1653, 1654, 2274, 2275) e6b6124 Separate tests for same CVEs into separate files Matthaus Owens (1): 3ec5d5c Update CHANGELOG, lib/puppet.rb, conf/redhat/puppet.spec for 2.6.18 Nick Lewis (2): 66249d4 Always read request body when using Rack bdcf029 Fix order-dependent test failure in rest_authconfig_spec Patrick Carlisle (4): ccf2e4c (#19391) (CVE-2013-1652) Disallow use_node compiler parameter for remote requests 6a7bd25 (#19392) (CVE-2013-1653) Validate instances passed to indirector ac44d87 (#19392) (CVE-2013-1653) Validate indirection model in save handler d5c9a2c (#19392) (CVE-2013-1653) Fix acceptance test to catch unvalidated model on 2.6 -- You received this message because you are subscribed to the Google Groups "Puppet Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to puppet-dev+unsubscribe@googlegroups.com. To post to this group, send email to puppet-dev@googlegroups.com. Visit this group at http://groups.google.com/group/puppet-dev?hl=en. For more options, visit https://groups.google.com/groups/opt_out.