[Pkg-puppet-devel] puppet update for CVE-2010-0156 in stable and	oldstable
    Giuseppe Iuculano 
    iuculano at debian.org
       
    Mon Mar 29 17:04:07 UTC 2010
    
    
  
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for puppet some time ago.
CVE-2010-0156[0]:
| Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local
| users to overwrite arbitrary files via a symlink attack on the (1)
| /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4)
| /tmp/puppetdoc.aux temporary file.
Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable and oldstable.
It does not warrant a DSA.
However it would be nice if this could get fixed via a regular point
update[1].
Please contact the release team for this.
This is an automatically generated mail, in case you are already working
on an
upgrade this is of course pointless.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0156
    http://security-tracker.debian.org/tracker/CVE-2010-0156
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-puppet-devel/attachments/20100329/828dd09f/attachment.pgp>
    
    
More information about the Pkg-puppet-devel
mailing list