|
|
Log in / Subscribe / Register

Arch Linux alert ASA-202107-8 (puppet)

From:  Jonas Witschel via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@lists.archlinux.org
Subject:  [ASA-202107-8] puppet: privilege escalation
Date:  Sat, 03 Jul 2021 18:25:21 +0200
Message-ID:  <20210703162521.ylaudytfkj5pwafs@archlinux.org>
Cc:  Jonas Witschel <diabonas@archlinux.org>

Arch Linux Security Advisory ASA-202107-8 ========================================= Severity: Medium Date : 2021-07-01 CVE-ID : CVE-2021-27021 Package : puppet Type : privilege escalation Remote : Yes Link : https://security.archlinux.org/AVG-2105 Summary ======= The package puppet before version 6.23.0-1 is vulnerable to privilege escalation. Resolution ========== Upgrade to 6.23.0-1. # pacman -Syu "puppet>=6.23.0-1" The problem has been fixed upstream in version 6.23.0. Workaround ========== None. Description =========== A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query. This has been resolved in Puppet DB 6.17.0, 7.4.1, Platform 6.23, 7.7.0 and Puppet Enterprise 2021.2, 2019.8.7. Impact ====== A privilege escalation security issue allowed users to delete tables. References ========== https://puppet.com/security/cve/cve-2021-27021/ https://puppet.com/docs/puppetdb/6/release_notes.html#pup... https://tickets.puppetlabs.com/browse/PDB-5138 https://github.com/puppetlabs/puppetdb/commit/c146e624d23... https://github.com/puppetlabs/puppetdb/commit/f8dc81678cf... https://github.com/puppetlabs/puppetdb/commit/72bd1375114... https://security.archlinux.org/CVE-2021-27021


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds