Updated puppet and puppet3 package fix security vulnerabilities
Publication date: 26 Aug 2013Modification date: 26 Aug 2013
Type: security
Affected Mageia releases : 2 , 3
CVE: CVE-2013-4761 , CVE-2013-4956
Description
It was discovered that Puppet incorrectly handled the resource_type service. A local attacker on the master could use this issue to execute arbitrary Ruby files (CVE-2013-4761). It was discovered that Puppet incorrectly handled permissions on the modules it installed. Modules could be installed with the permissions that existed when they were built, possibly exposing them to a local attacker (CVE-2013-4956).
References
- https://bugs.mageia.org/show_bug.cgi?id=11019
- http://puppetlabs.com/security/cve/cve-2013-4761/
- http://puppetlabs.com/security/cve/cve-2013-4956/
- http://www.ubuntu.com/usn/usn-1928-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4956
SRPMS
3/core
- puppet-2.7.23-1.mga3
- puppet3-3.2.4-1.mga3
2/core
- puppet-2.7.23-1.mga2