SB2011093003 - Fedora EPEL 5 update for puppet
Published: September 30, 2011 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2011-3870)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
2) Link following (CVE-ID: CVE-2011-3869)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-3871)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Remediation
Install update from vendor's website.