logo
DATABASE RESOURCES PRICING ABOUT US

Medium: puppet

Description

**Issue Overview:** Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files. Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file. Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file. **Affected Packages:** puppet **Issue Correction:** Run _yum update puppet_ to update your system. **New Packages:** i686:     puppet-2.6.6-3.2.amzn1.i686     puppet-server-2.6.6-3.2.amzn1.i686     puppet-debuginfo-2.6.6-3.2.amzn1.i686 src:     puppet-2.6.6-3.2.amzn1.src x86_64:     puppet-debuginfo-2.6.6-3.2.amzn1.x86_64     puppet-2.6.6-3.2.amzn1.x86_64     puppet-server-2.6.6-3.2.amzn1.x86_64


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 1 puppet 2.6.6-3.2.amzn1
Amazon Linux 1 puppet-server 2.6.6-3.2.amzn1
Amazon Linux 1 puppet-debuginfo 2.6.6-3.2.amzn1
Amazon Linux 1 puppet 2.6.6-3.2.amzn1
Amazon Linux 1 puppet-debuginfo 2.6.6-3.2.amzn1
Amazon Linux 1 puppet 2.6.6-3.2.amzn1
Amazon Linux 1 puppet-server 2.6.6-3.2.amzn1

Related