Puppet Server and Agent: Multiple vulnerabilities — GLSA 201606-02

Multiple vulnerabilities have been found in Puppet Server and Agent, the worst of which could lead to arbitrary code execution.

Affected packages

app-admin/puppet-agent on all architectures
Affected versions < 1.4.2
Unaffected versions >= 1.4.2
app-admin/puppetserver on all architectures
Affected versions < 2.3.2
Unaffected versions >= 2.3.2

Background

Puppet Agent contains Puppet’s main code and all of the dependencies needed to run it, including Facter, Hiera, and bundled versions of Ruby and OpenSSL.

Description

Multiple vulnerabilities have been discovered in Puppet Server and Agent. Please review the CVE identifiers referenced below for details.

Impact

Remote attackers, impersonating a trusted broker, could potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All Puppet Agent users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/puppet-agent-1.4.2"
 

All Puppet Server users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/puppetserver-2.3.2"
 

References

Release date
June 05, 2016

Latest revision
June 05, 2016: 3

Severity
normal

Exploitable
remote

Bugzilla entries