DEBIAN-CVE-2011-3871

Source
https://security-tracker.debian.org/tracker/CVE-2011-3871
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-3871.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2011-3871
Upstream
Published
2011-10-27T20:55:01Z
Modified
2025-09-19T06:15:57Z
Summary
[none]
Details

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

References

Affected packages

Debian:11 / puppet

Package

Name
puppet
Purl
pkg:deb/debian/puppet?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.3-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}