Lucene search

K
gentooGentoo FoundationGLSA-201308-04
HistoryAug 23, 2013 - 12:00 a.m.

Puppet: Multiple vulnerabilities

2013-08-2300:00:00
Gentoo Foundation
security.gentoo.org
8

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.209 Low

EPSS

Percentile

96.3%

Background

Puppet is a system configuration management tool written in Ruby.

Description

Multiple vulnerabilities have been discovered in Puppet. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions.

Workaround

There is no known workaround at this time.

Resolution

All Puppet users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.23"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/puppet< 2.7.23UNKNOWN

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.209 Low

EPSS

Percentile

96.3%