Facter 2.0.2 is a security fix release in the Facter 2 series. This
release addresses CVE-2014-3248. It has no other bug fixes or new
features. All users of Facter 2.0.1 and earlier are encouraged to
update to 2.0.2.

** CVE-2014-3248 **
Arbitrary Code Execution with Required Social Engineering
An attacker could convince an administrator to unknowingly create and
execute malicious code on platforms with Ruby 1.9.1 and earlier.
CVSSv2 Score: 5.2
Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

Affected Facter versions (ruby 1.9.1 and earlier only):
2.x
1.6.x

Fixed Facter versions:
2.0.2

See the Release Notes here:
http://docs.puppetlabs.com/facter/2.0/release_notes.html#facter-202

For more information on this vulnerability, please visit
https://puppetlabs.com/security/cve/cve-2014-3248

To report issues with the release, file a ticket in the "FACT" project
on http://tickets.puppetlabs.com/ and set the "Affects version/s"
field to "2.0.2"

-- 
Moses Mendoza
Puppet Labs

Join us at PuppetConf 2014, September 20-24 in San Francisco
Register by July 31st to take advantage of the Early Bird discount —save $249!

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/CA%2B421WYT1owqbQdHQDeSEvb_9o_1zfErQ89%3DOH5qHn%2BtkfquZw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to