Multiple vulnerabilities have been found in Puppet Server and Agent, the worst of which could lead to arbitrary code execution.
|Package||app-admin/puppet-agent on all architectures|
|Affected versions||< 1.4.2|
|Unaffected versions||>= 1.4.2|
|Package||app-admin/puppetserver on all architectures|
|Affected versions||< 2.3.2|
|Unaffected versions||>= 2.3.2|
Puppet Agent contains Puppet’s main code and all of the dependencies needed to run it, including Facter, Hiera, and bundled versions of Ruby and OpenSSL.
Multiple vulnerabilities have been discovered in Puppet Server and Agent. Please review the CVE identifiers referenced below for details.
Remote attackers, impersonating a trusted broker, could potentially execute arbitrary code.
There is no known workaround at this time.
All Puppet Agent users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppet-agent-1.4.2"
All Puppet Server users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/puppetserver-2.3.2"