MGASA-2013-0259

Source
https://advisories.mageia.org/MGASA-2013-0259.html
Import Source
https://advisories.mageia.org/MGASA-2013-0259.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0259
Related
Published
2013-08-26T19:44:50Z
Modified
2013-08-26T19:44:41Z
Summary
Updated puppet and puppet3 package fix security vulnerabilities
Details

It was discovered that Puppet incorrectly handled the resource_type service. A local attacker on the master could use this issue to execute arbitrary Ruby files (CVE-2013-4761).

It was discovered that Puppet incorrectly handled permissions on the modules it installed. Modules could be installed with the permissions that existed when they were built, possibly exposing them to a local attacker (CVE-2013-4956).

References
Credits

Affected packages

Mageia:2 / puppet

Package

Name
puppet
Purl
pkg:rpm/mageia/puppet?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.23-1.mga2

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / puppet

Package

Name
puppet
Purl
pkg:rpm/mageia/puppet?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.23-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / puppet3

Package

Name
puppet3
Purl
pkg:rpm/mageia/puppet3?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.4-1.mga3

Ecosystem specific

{
    "section": "core"
}