CVE-2013-1640

Publication date 12 March 2013

Last updated 24 July 2024


Ubuntu priority

The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.

Read the notes from the security team

Status

Package Ubuntu Release Status
puppet 12.10 quantal
Fixed 2.7.18-1ubuntu1.1
12.04 LTS precise
Fixed 2.7.11-1ubuntu2.2
11.10 oneiric
Fixed 2.7.1-1ubuntu3.8
10.04 LTS lucid Ignored
8.04 LTS hardy Ignored end of life

Notes


mdeslaur

Upstream no longer supports 0.25.x as found in lucid. The code is substantially different, rendering a backport of this security update difficult. Since puppet in Lucid is almost end-of-life, we aren't planning on backporting the security fix to it. For Lucid users, we recommend using puppet 2.7.1-1ubuntu3.8~ubuntu10.04.1 currently in lucid-backports.

References

Related Ubuntu Security Notices (USN)

Other references