gentoo-full-overlay/metadata/glsa/glsa-201606-02.xml

64 lines
2.3 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201606-02">
<title>Puppet Server and Agent: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Puppet Server and
Agent, the worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild"/>
<announced>2016-06-05</announced>
<revised count="3">2016-06-05</revised>
<bug>577450</bug>
<bug>581372</bug>
<access>remote</access>
<affected>
<package name="app-admin/puppet-agent" auto="yes" arch="*">
<unaffected range="ge">1.4.2</unaffected>
<vulnerable range="lt">1.4.2</vulnerable>
</package>
<package name="app-admin/puppetserver" auto="yes" arch="*">
<unaffected range="ge">2.3.2</unaffected>
<vulnerable range="lt">2.3.2</vulnerable>
</package>
</affected>
<background>
<p>Puppet Agent contains Puppets main code and all of the dependencies
needed to run it, including Facter, Hiera, and bundled versions of Ruby
and OpenSSL.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Puppet Server and
Agent. Please review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>Remote attackers, impersonating a trusted broker, could potentially
execute arbitrary code.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Puppet Agent users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-admin/puppet-agent-1.4.2"
</code>
<p>All Puppet Server users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-admin/puppetserver-2.3.2"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785">CVE-2016-2785</uri>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786">CVE-2016-2786</uri>
</references>
<metadata tag="requester" timestamp="2016-03-15T09:09:16Z">b-man</metadata>
<metadata tag="submitter" timestamp="2016-06-05T20:14:52Z">b-man</metadata>
</glsa>