Issue #9794 has been updated by Michael Stahnke.
CVE-2011-3869 ---------------------------------------- Bug #9794: `k5login` type can overwrite arbitrary files as root https://projects.puppetlabs.com/issues/9794 Author: Daniel Pittman Status: Accepted Priority: Immediate Assignee: Daniel Pittman Category: security Target version: Affected Puppet version: Keywords: Branch: The `k5login` type is typically used to manage a file in the home directory of a user; the explicit purpose of the files is to allow access to other users. It writes to the target file directly, as root, without doing anything to secure the file. That would allow the owner of the home directory to symlink to anything on the system, and have it replaced with the "correct" content of the file. Which is a fairly obvious escalation to root the next time Puppet runs. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/puppet-bugs?hl=en.
