Puppet is a system configuration management tool written in Ruby.
Multiple vulnerabilities have been discovered in Puppet. Please review the CVE identifiers referenced below for details.
A local attacker could gain elevated privileges, or access and modify arbitrary files. Furthermore, a remote attacker may be able to spoof a Puppet Master or write X.509 Certificate Signing Requests to arbitrary locations.
There is no known workaround at this time.
All Puppet users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.11"