Skip to content

Commit 1057649

Browse files
authored
Add advisories for CVE-2018-14042 and CVE-2014-3248 (#575)
* One brand new file: gems/bootstrap/CVE-2018-14042.yml * Four advisories based on CVE-2014-3248 advisory
1 parent f3ffb50 commit 1057649

File tree

5 files changed

+111
-1
lines changed

5 files changed

+111
-1
lines changed

gems/bootstrap/CVE-2018-14042.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
gem: bootstrap
33
cve: 2018-14042
44
ghsa: 7mvr-5x2g-wfc8
5-
url: https://github.com/twbs/bootstrap/issues/26423
5+
url: https://github.com/twbs/bootstrap/issues/26428
66
title: Bootstrap Cross-site Scripting vulnerability
77
date: 2018-09-13
88
description:

gems/facter/CVE-2014-3248.yml

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
gem: facter
3+
cve: 2014-3248
4+
ghsa: 92v7-pq4h-58j5
5+
url: https://github.com/advisories/GHSA-92v7-pq4h-58j5
6+
title: Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
7+
date: 2017-10-24
8+
description:
9+
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
10+
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera
11+
before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier,
12+
allows local users to gain privileges via a Trojan horse file in the current working
13+
directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2)
14+
Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so;
15+
or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so
16+
in puppet/confine.
17+
patched_versions:
18+
- '~> 1.7.6'
19+
- '>= 2.0.2'
20+
related:
21+
url:
22+
- https://nvd.nist.gov/vuln/detail/CVE-2014-3248
23+
- https://github.com/advisories/GHSA-92v7-pq4h-58j5
24+
- http://puppetlabs.com/security/cve/cve-2014-3248
25+
- http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/
26+
- http://secunia.com/advisories/59197
27+
- http://secunia.com/advisories/59200
28+
- http://www.securityfocus.com/bid/68035

gems/hiera/CVE-2014-3248.yml

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
gem: hiera
3+
cve: 2014-3248
4+
ghsa: 92v7-pq4h-58j5
5+
url: https://github.com/advisories/GHSA-92v7-pq4h-58j5
6+
title: Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
7+
date: 2017-10-24
8+
description:
9+
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
10+
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera
11+
before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier,
12+
allows local users to gain privileges via a Trojan horse file in the current working
13+
directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2)
14+
Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so;
15+
or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so
16+
in puppet/confine.
17+
patched_versions:
18+
- '>= 1.3.4'
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2014-3248
22+
- https://github.com/advisories/GHSA-92v7-pq4h-58j5
23+
- http://puppetlabs.com/security/cve/cve-2014-3248
24+
- http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/
25+
- http://secunia.com/advisories/59197
26+
- http://secunia.com/advisories/59200
27+
- http://www.securityfocus.com/bid/68035
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
gem: mcollective-client
3+
cve: 2014-3248
4+
ghsa: 92v7-pq4h-58j5
5+
url: https://github.com/advisories/GHSA-92v7-pq4h-58j5
6+
title: Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
7+
date: 2017-10-24
8+
description:
9+
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
10+
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera
11+
before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier,
12+
allows local users to gain privileges via a Trojan horse file in the current working
13+
directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2)
14+
Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so;
15+
or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so
16+
in puppet/confine.
17+
patched_versions:
18+
- '>= 2.5.2'
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2014-3248
22+
- https://github.com/advisories/GHSA-92v7-pq4h-58j5
23+
- http://puppetlabs.com/security/cve/cve-2014-3248
24+
- http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/
25+
- http://secunia.com/advisories/59197
26+
- http://secunia.com/advisories/59200
27+
- http://www.securityfocus.com/bid/68035

gems/puppet/CVE-2014-3248.yml

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
gem: puppet
3+
cve: 2014-3248
4+
ghsa: 92v7-pq4h-58j5
5+
url: https://github.com/advisories/GHSA-92v7-pq4h-58j5
6+
title: Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
7+
date: 2017-10-24
8+
description:
9+
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
10+
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera
11+
before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier,
12+
allows local users to gain privileges via a Trojan horse file in the current working
13+
directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2)
14+
Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so;
15+
or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so
16+
in puppet/confine.
17+
patched_versions:
18+
- '~> 2.7.26'
19+
- '>= 3.6.2'
20+
related:
21+
url:
22+
- https://nvd.nist.gov/vuln/detail/CVE-2014-3248
23+
- https://github.com/advisories/GHSA-92v7-pq4h-58j5
24+
- http://puppetlabs.com/security/cve/cve-2014-3248
25+
- http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/
26+
- http://secunia.com/advisories/59197
27+
- http://secunia.com/advisories/59200
28+
- http://www.securityfocus.com/bid/68035

0 commit comments

Comments
 (0)