[Bug 882507] [NEW] Sync puppet 2.7.6-1 (main) from Debian sid (main)
Marc Cluet
882507 at bugs.launchpad.net
Thu Oct 27 10:48:53 UTC 2011
Public bug reported:
Please sync puppet 2.7.6-1 (main) from Debian sid (main)
The delta has dropped completely in the last release, this merits a
direct sync
Explanation of the Ubuntu delta and why it can be dropped:
* SECURITY UPDATE: puppet master impersonation via incorrect certificates
- debian/patches/CVE-2011-3872.patch: refactor certificate handling.
- Thanks to upstream for providing the patch.
- CVE-2011-3872
* SECURITY UPDATE: k5login can overwrite arbitrary files as root
- debian/patches/CVE-2011-3869.patch: adjust type/k5login.rb to securely
open the file before writing to it as root
- CVE-2011-3869
* SECURITY UPDATE: didn't drop privileges before creating and changing
permissions on SSH keys
- debian/patches/CVE-2011-3870.patch: adjust ssh_authorized_key/parsed.rb
to drop privileges before creating the ssh directory and setting
permissions
- CVE-2011-3870
* SECURITY UPDATE: fix predictable temporary filename in ralsh
- debian/patches/CVE-2011-3871.patch: adjust application/resource.rb to
use an unpredictable filename
- CVE-2011-3871
* SECURITY UPDATE: file indirector injection, similar to CVE-2011-3848
- secure-indirector-file-backed-terminus-base-cla.patch: Since the
indirector file backed terminus base class is only used by the test
suite, remove it and update test cases to use a continuing class.
* SECURITY UPDATE: k5login can overwrite arbitrary files as root
- debian/patches/CVE-2011-3869.patch: adjust type/k5login.rb to securely
open the file before writing to it as root
- CVE-2011-3869
* SECURITY UPDATE: didn't drop privileges before creating and changing
permissions on SSH keys
- debian/patches/CVE-2011-3870.patch: adjust ssh_authorized_key/parsed.rb
to drop privileges before creating the ssh directory and setting
permissions
- CVE-2011-3870
* SECURITY UPDATE: fix predictable temporary filename in ralsh
- debian/patches/CVE-2011-3871.patch: adjust application/resource.rb to
use an unpredictable filename
- CVE-2011-3871
* SECURITY UPDATE: file indirector injection, similar to CVE-2011-3848
- secure-indirector-file-backed-terminus-base-cla.patch: Since the
indirector file backed terminus base class is only used by the test
suite, remove it and update test cases to use a continuing class.
* SECURITY UPDATE: unauthenticated directory traversal allows writing of
arbitrary files as puppet master
- debian/patches/CVE-2011-3848.patch: update lib/puppet/indirector.rb,
lib/puppet/indirector/ssl_file.rb, lib/puppet/indirector/yaml.rb,
spec/unit/indirector/ssl_file.rb and spec/unit/indirector/yaml.rb to
perform proper input validation.
- CVE-2011-3848
- LP: #861182
* Merge from debian unstable. Remaining changes:
- debian/puppetmaster-passenger.postinst: Use cacrl instead of hostcrl to
set the location of the CRL in apache2 configuration. Fix apache2
configuration on upgrade as well (LP: #641001)
- move all puppet dependencies to puppet-common since all the code
actually located in puppet-common.
- move libagueas from a recommend to a dependency.
* New upstream version
* Bump Standards-Version (no changes)
* Adjust debian/source/options to allow for a VCS-generated patch
* Tell adduser not to create /var/lib/puppet (Closes: #609896)
* Use dpkg-statoverride to handle permissions
* Allow the use of file-rc (Closes: #625638)
* Use the pkg-ruby-extras watch service
* Merge from debian unstable. Remaining changes:
- debian/puppetmaster-passenger.postinst: Use cacrl instead of hostcrl to
set the location of the CRL in apache2 configuration. Fix apache2
configuration on upgrade as well (LP: #641001)
- move all puppet dependencies to puppet-common since all the code
actually located in puppet-common.
- move libagueas from a recommend to a dependency.
>>> ENTER_EXPLANATION_HERE <<<
Changelog entries since current precise version 2.7.1-1ubuntu3.2:
puppet (2.7.6-1) unstable; urgency=high
* New upstream release (CVE-2011-3872)
* Remove cherry-picked "groupadd_aix_warning" patch
* Install all new manpages
-- Stig Sandbeck Mathisen <ssm at debian.org> Sat, 22 Oct 2011 14:08:22
+0000
puppet (2.7.5-3) unstable; urgency=low
* Generate certificate properly for puppetmaster-passenger (Closes: #645073)
* Init scripts: Remove superfluous arguments for agent and queue daemons
* Move the etckeeper hooks from puppet to puppet-common
-- Stig Sandbeck Mathisen <ssm at debian.org> Wed, 12 Oct 2011 15:43:24
+0200
puppet (2.7.5-2) unstable; urgency=low
* Add patch to fix upstream issue #9027 re manages_aix_lam warnings
* Adjust dependencies. "libstomp-ruby" renamed to "ruby-stomp"
-- Stig Sandbeck Mathisen <ssm at debian.org> Thu, 06 Oct 2011 15:24:59
+0200
puppet (2.7.5-1) unstable; urgency=low
* New upstream version
* Remove README.source, the up-to-date information is kept in
debian/control
-- Stig Sandbeck Mathisen <ssm at debian.org> Wed, 05 Oct 2011 16:36:28
+0200
puppet (2.7.3-3) unstable; urgency=high
[Micah Anderson]
* Fix SSH authorized keys symlink attack (CVE-2011-3870)
* Fix K5login content attack (CVE-2011-3869)
* Fix predictable temporary file using RAL (CVE-2011-3871)
* Fix file indirectory injection
[Stig Sandbeck Mathisen]
* Update package conflicts for puppet-el and vim-puppet (Closes: #643657)
-- Micah Anderson <micah at debian.org> Fri, 30 Sep 2011 21:08:55 -0400
puppet (2.7.3-2) unstable; urgency=high
* Resist directory traversal attacks (CVE-2011-3848)
-- Micah Anderson <micah at debian.org> Wed, 28 Sep 2011 11:00:12 -0400
puppet (2.7.3-1) unstable; urgency=low
* New upstream version
-- Stig Sandbeck Mathisen <ssm at debian.org> Tue, 16 Aug 2011 08:38:28
+0200
** Affects: puppet (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/882507
Title:
Sync puppet 2.7.6-1 (main) from Debian sid (main)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/puppet/+bug/882507/+subscriptions
More information about the Ubuntu-server-bugs
mailing list