DEBIAN-CVE-2022-0675

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-0675
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-0675.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-0675
Upstream
Published
2022-03-02T21:15:08Z
Modified
2025-09-19T06:22:46Z
Summary
[none]
Details

In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state.

References

Affected packages

Debian:12 / puppet-module-puppetlabs-firewall

Package

Name
puppet-module-puppetlabs-firewall
Purl
pkg:deb/debian/puppet-module-puppetlabs-firewall?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / puppet-module-puppetlabs-firewall

Package

Name
puppet-module-puppetlabs-firewall
Purl
pkg:deb/debian/puppet-module-puppetlabs-firewall?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / puppet-module-puppetlabs-firewall

Package

Name
puppet-module-puppetlabs-firewall
Purl
pkg:deb/debian/puppet-module-puppetlabs-firewall?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}