Multiple vulnerabilities have been found in Puppet, the worst of which might allow local attackers to gain escalated privileges.
|Package||app-admin/puppet on all architectures|
|Affected versions||< 2.7.11|
|Unaffected versions||>= 2.7.11|
Puppet is a system configuration management tool written in Ruby.
Multiple vulnerabilities have been discovered in Puppet. Please review the CVE identifiers referenced below for details.
A local attacker could gain elevated privileges, or access and modify arbitrary files. Furthermore, a remote attacker may be able to spoof a Puppet Master or write X.509 Certificate Signing Requests to arbitrary locations.
There is no known workaround at this time.
All Puppet users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppet-2.7.11"