USN-4804-1: Puppet vulnerabilities
Publication date
15 March 2021
Overview
Several security issues were fixed in Puppet.
Releases
Packages
- puppet - Centralized configuration management
Details
It was discovered that Puppet installed modules with world writable
permissions. An attacker could use this vulnerability to execute arbitrary
code or cause a denial of service. (CVE-2017-10689)
It was discovered that Puppet could be used to force YAML deserialization in an
unsafe manner. A remote attacker could use this vulnerability for remote code
execution. (CVE-2017-2295)
It was discovered that Puppet installed modules with world writable
permissions. An attacker could use this vulnerability to execute arbitrary
code or cause a denial of service. (CVE-2017-10689)
It was discovered that Puppet could be used to force YAML deserialization in an
unsafe manner. A remote attacker could use this vulnerability for remote code
execution. (CVE-2017-2295)
Update instructions
After a standard system update you need to restart Puppet to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | puppet – 3.8.5-2ubuntu0.1+esm1 | ||
puppet-common – 3.8.5-2ubuntu0.1+esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.