Puppet: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201203-03 / puppet
||March 06, 2012
||March 06, 2012: 1
All supported architectures
#303729, #308031, #384859, #385149, #388161, #403963
Multiple vulnerabilities have been found in Puppet, the worst of
which might allow local attackers to gain escalated privileges.
Puppet is a system configuration management tool written in Ruby.
Multiple vulnerabilities have been discovered in Puppet. Please review
the CVE identifiers referenced below for details.
A local attacker could gain elevated privileges, or access and modify
arbitrary files. Furthermore, a remote attacker may be able to spoof a
Puppet Master or write X.509 Certificate Signing Requests to arbitrary
There is no known workaround at this time.
All Puppet users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.11"