ALAS-2011-011


Amazon Linux 1 Security Advisory: ALAS-2011-11
Advisory Release Date: 2011-10-31 18:22 Pacific
Advisory Updated Date: 2014-09-14 14:31 Pacific
Severity: Medium

Issue Overview:

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.


Affected Packages:

puppet


Issue Correction:
Run yum update puppet to update your system.

New Packages:
i686:
    puppet-2.6.6-3.2.amzn1.i686
    puppet-server-2.6.6-3.2.amzn1.i686
    puppet-debuginfo-2.6.6-3.2.amzn1.i686

src:
    puppet-2.6.6-3.2.amzn1.src

x86_64:
    puppet-debuginfo-2.6.6-3.2.amzn1.x86_64
    puppet-2.6.6-3.2.amzn1.x86_64
    puppet-server-2.6.6-3.2.amzn1.x86_64