-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1317
                          puppet security update
                             20 September 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           puppet
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Modify Arbitrary Files          -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-4956 CVE-2013-4761 

Reference:         ESB-2013.1122

Original Bulletin: 
   http://www.debian.org/security/2013/dsa-2761

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2761-1                   security@debian.org
http://www.debian.org/security/                          Raphael Geissert
September 19, 2013                     http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : puppet
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE ID         : CVE-2013-4761 CVE-2013-4956

Several vulnerabilities were discovered in puppet, a centralized
configuration management system. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2013-4761

    The 'resource_type' service (disabled by default) could be used to
    make puppet load arbitrary Ruby code from puppet master's file
    system.

CVE-2013-4956

    Modules installed with the Puppet Module Tool might be installed
    with weak permissions, possibly allowing local users to read or
    modify them.

The stable distribution (wheezy) has been updated to version 2.7.33 of
puppet. This version includes the patches for all the previous DSAs
related to puppet in wheezy. In this version, the puppet report format
is now correctly reported as version 3.

It is to be expected that future DSAs for puppet update to a newer,
bug fix-only, release of the 2.7 branch.

The oldstable distribution (squeeze) has not been updated for this
advisory: as of this time there is no fix for CVE-2013-4761 and the
package is not affected by CVE-2013-4956.

For the stable distribution (wheezy), these problems have been fixed in
version 2.7.23-1~deb7u1.

For the testing distribution (jessie) and the unstable distribution (sid),
these problems have been fixed in version 3.2.4-1.

We recommend that you upgrade your puppet packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlI7cvQACgkQYy49rUbZzlq22wCcCQGR2FfvrHBuIaWlPiZya2v3
XREAn3V+J1Fu+C2WSu6sZW1LPiitkUsT
=kr8l
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ABYR
-----END PGP SIGNATURE-----