Packages
- puppet - Centralized configuration management
Details
It was discovered that Puppet incorrectly handled the resource_type
service. A local attacker on the primary server could use this issue to
execute arbitrary Ruby files. (CVE-2013-4761)
It was discovered that Puppet incorrectly handled permissions on the
modules it installed. Modules could be installed with the permissions that
existed when they were built, possibly exposing them to a local attacker.
(CVE-2013-4956)
It was discovered that Puppet incorrectly handled the resource_type
service. A local attacker on the primary server could use this issue to
execute arbitrary Ruby files. (CVE-2013-4761)
It was discovered that Puppet incorrectly handled permissions on the
modules it installed. Modules could be installed with the permissions that
existed when they were built, possibly exposing them to a local attacker.
(CVE-2013-4956)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
13.04 raring | puppet-common – 2.7.18-4ubuntu1.2 | ||
12.10 quantal | puppet-common – 2.7.18-1ubuntu1.3 | ||
12.04 precise | puppet-common – 2.7.11-1ubuntu2.4 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.