Multiple vulnerabilities have been found in Puppet, the worst of which might allow local attackers to gain escalated privileges.
Package | app-admin/puppet on all architectures |
---|---|
Affected versions | < 2.7.11 |
Unaffected versions | >= 2.7.11 |
Puppet is a system configuration management tool written in Ruby.
Multiple vulnerabilities have been discovered in Puppet. Please review the CVE identifiers referenced below for details.
A local attacker could gain elevated privileges, or access and modify arbitrary files. Furthermore, a remote attacker may be able to spoof a Puppet Master or write X.509 Certificate Signing Requests to arbitrary locations.
There is no known workaround at this time.
All Puppet users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.11"