Mehrere Probleme in Puppet
ID: | 201308-04 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | Sa, 24. August 2013, 10:28 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1640 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1652 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1653 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4956 |
Applikationen: | Puppet |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) ------enig2IABRNMPCKGJVPJRWPNKX Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201308-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Puppet: Multiple vulnerabilities Date: August 23, 2013 Bugs: #456002, #461656, #473720, #481186 ID: 201308-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Puppet, the worst of which could lead to execution of arbitrary code. Background ========== Puppet is a system configuration management tool written in Ruby. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-admin/puppet < 2.7.23 >= 2.7.23 Description =========== Multiple vulnerabilities have been discovered in Puppet. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. Workaround ========== There is no known workaround at this time. Resolution ========== All Puppet users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.23" References ========== [ 1 ] CVE-2012-6120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6120 [ 2 ] CVE-2013-1640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1640 [ 3 ] CVE-2013-1652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1652 [ 4 ] CVE-2013-1653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1653 [ 5 ] CVE-2013-1654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1654 [ 6 ] CVE-2013-1655 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1655 [ 7 ] CVE-2013-2274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2274 [ 8 ] CVE-2013-2275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2275 [ 9 ] CVE-2013-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3567 [ 10 ] CVE-2013-4956 http://nvd.nist.gov/nvd.cvm?cvename=CVE-2013-4761 [ 11 ] CVE-2013-4956 http://nvd.nist.gov/nvd.cvm?cvename=CVE-2013-4956 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201308-04.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 ------enig2IABRNMPCKGJVPJRWPNKX Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJSF6w3AAoJECo/aRed9267o34H/AyvRPjuc7NvefQNfKNBlOXU JhJHWfq1hzPI+bcwszqFgaCMdGx4nc4RiK4hQtODkV17pFfX0RSfFX93f+gw8mZ+ HnJz4U/9cdYOQx4TqRfAIXjMoKVKHZYf9C8LeBTXi5wlS8LJEYWUefc8rOJ3Y/90 F3YbOVikhkjEtBxfmgx7j7PnGEcdUpADb2IPEVe9Gu4pxboWXUPY/gQn8zmO7qh5 dpMkWmPVCGGrYRc6hmPNl/o5xhUmLy6eOkZfCHE0KXPqYd/RRO//973iQq8zW6CV he+ZrWRcB8q3lohJV2wefwliFepnFayoeBVxTF6e8pO5q2nAlDJU6Etr6BHungc= =qXoc -----END PGP SIGNATURE----- ------enig2IABRNMPCKGJVPJRWPNKX-- |