Change logs for puppet source package in Precise

  • puppet (2.7.11-1ubuntu2.7) precise-security; urgency=low
    
      * SECURITY REGRESSION: Incorrect default file mode (LP: #1267385)
        - debian/patches/CVE-2013-4969-regression.patch: fix incorrect file
          mode in lib/puppet/type/file.rb, lib/puppet/util.rb,
          spec/unit/type/file_spec.rb.
        - CVE-2013-4969
     -- Marc Deslauriers <email address hidden>   Thu, 09 Jan 2014 07:56:00 -0500
  • puppet (2.7.11-1ubuntu2.6) precise-security; urgency=low
    
      * SECURITY UPDATE: unsafe use of temp files
        - debian/patches/update-replace_file.patch: updated replace_file to
          enable Windows support so security patch applies better.
        - debian/patches/CVE-2013-4969-2.7.x-temp-file.patch: Use replace_file
          to update a file's contents in lib/puppet/type/file.rb,
          lib/puppet/util.rb, updated tests in
          spec/integration/type/file_spec.rb, spec/unit/type/file_spec.rb.
        - CVE-2013-4969
     -- Marc Deslauriers <email address hidden>   Mon, 23 Dec 2013 08:27:21 -0500
  • puppet (2.7.11-1ubuntu2.5) precise-proposed; urgency=low
    
      * debian/patches/2.7.11-remove-process_name-performance.patch:
        Fixes performance regression caused by a thread that loops forever in
        order to change a process name when told so (LP: #995719)
     -- Adam Stokes <email address hidden>   Tue, 24 Sep 2013 14:58:14 -0400
  • puppet (2.7.11-1ubuntu2.4) precise-security; urgency=low
    
      * SECURITY UPDATE: August 2013 privilege escalation and code execution
        vulnerabilities
        - debian/patches/ubuntu-2.7.11-puppet-Aug-2013-CVE-fixes.patch:
          upstream patch to resolve security issues.
        - CVE-2013-4956
        - CVE-2013-4761
     -- Marc Deslauriers <email address hidden>   Wed, 14 Aug 2013 20:30:05 -0400
  • puppet (2.7.11-1ubuntu2.3) precise-security; urgency=low
    
      * SECURITY UPDATE: Remote code execution on master from unauthenticated
        clients
        - debian/patches/2.7.21-Patch-for-CVE-2013-3567.patch: upstream patch
          to use safe_yama.
        - CVE-2013-3567
     -- Marc Deslauriers <email address hidden>   Fri, 14 Jun 2013 09:06:22 -0400
  • puppet (2.7.11-1ubuntu2.2) precise-security; urgency=low
    
      * SECURITY UPDATE: Multiple security issues
        - debian/patches/security-mar-2013.patch: upstream patch to fix
          multiple security issues.
        - CVE-2013-1640 - Remote code execution on master from authenticated clients
        - CVE-2013-1652 - Insufficient input validation
        - CVE-2013-1653 - Remote code execution
        - CVE-2013-1654 - Protocol downgrade
        - CVE-2013-1655 - Unauthenticated remote code execution risk
        - CVE-2013-2275 - Incorrect default report ACL
     -- Marc Deslauriers <email address hidden>   Mon, 11 Mar 2013 12:32:11 -0400
  • puppet (2.7.11-1ubuntu2.1) precise-security; urgency=low
    
      * SECURITY UPDATE: Multiple July 2012 security issues
        - debian/patches/2.7.17-Puppet-July-2012-CVE-fixes.patch: upstream
          patch to fix multiple security issues.
        - CVE-2012-3864: arbitrary file read on master from authenticated
          clients
        - CVE-2012-3865: arbitrary file delete or denial of service on master
          from authenticated clients
        - CVE-2012-3866: last_run_report.yaml report file is world readable and
          leads to arbitrary file read on master by an agent
        - CVE-2012-3867: insufficient input validation for agent cert hostnames
     -- Marc Deslauriers <email address hidden>   Tue, 10 Jul 2012 07:58:03 -0400
  • puppet (2.7.11-1ubuntu2) precise; urgency=low
    
      * SECURITY UPDATE: Arbitrary file writes via predictable filename usage in
        appdmg and pkgdmg providers (LP: #978708)
        - debian/patches/CVE-2012-1906_CVE-2012-1986_to_CVE-2012-1989.patch
        - CVE-2012-1906
      * SECURITY UPDATE: Arbitrary file reads via Filebucket REST requests
        - debian/patches/CVE-2012-1906_CVE-2012-1986_to_CVE-2012-1989.patch
        - CVE-2012-1986
      * SECURITY UPDATE: Denial of service via Filebucket text/marshall support
        - debian/patches/CVE-2012-1906_CVE-2012-1986_to_CVE-2012-1989.patch
        - CVE-2012-1987
      * SECURITY UPDATE: Arbitrary code execution via Filebucket requests
        - debian/patches/CVE-2012-1906_CVE-2012-1986_to_CVE-2012-1989.patch
        - CVE-2012-1988
      * SECURITY UPDATE: Arbritrary file writes via predictable telnet output log
        filename
        - debian/patches/CVE-2012-1906_CVE-2012-1986_to_CVE-2012-1989.patch
        - CVE-2012-1989
      * debian/patches/puppet-12844: Re-fetch the patch from upstream since some
        missing pieces cause 'rake spec' to abort immediately
     -- Tyler Hicks <email address hidden>   Wed, 11 Apr 2012 03:55:10 -0500
  • puppet (2.7.11-1ubuntu1) precise; urgency=low
    
      [ Marc Cluet ]
      * debian/patches/puppet-12844: Cherry picked patch from upstream
        2.7.12 to revert new agent lockfile behaviour as it breaks upgrades
        from versions < 2.7.10.  This feature has been pushed out to
        puppet 3.x by upstream.
      * debian/puppetmaster-passenger.postinst (LP: #948983)
        - Fixed rack directory location
        - Added proper enabling of apache2 headers mod
      * debian/puppetmaster-passenger.postinst (LP: #950183)
        - Make sure we error if puppet config print doesn't work
    
      [ James Page ]
      * debian/puppetmaster-passenger.postinst:
        - Ensure upgrades from <= 2.7.11-1 fixup passenger apache
          configuration.
     -- Marc Cluet <email address hidden>   Fri, 16 Mar 2012 15:36:35 +0000
  • puppet (2.7.11-1) unstable; urgency=high
    
    
      * New upstream release
      * Urgency set to high due to regressions in previous release
        and security vulnerabilities
      * Execs when run with a user specified, but no group, get the root
        group. Similarly unexpected privileges are given to providers and
        types (egid remains as root), this is fixed with a patch from
        upstream (CVE-2012-1053)
      * Fix Klogin write through symlink (CVE-2012-1054)
    
     -- Micah Anderson <email address hidden>  Thu, 23 Feb 2012 18:24:48 -0500
  • puppet (2.7.10-1ubuntu1) precise; urgency=low
    
      * Use maintscript support in dh_installdeb rather than writing out
        dpkg-maintscript-helper commands by hand.  We now simply Pre-Depend on a
        new enough version of dpkg rather than using 'dpkg-maintscript-helper
        supports' guards, leading to more predictable behaviour on upgrades.
     -- Colin Watson <email address hidden>   Tue, 14 Feb 2012 11:08:59 +0000
  • puppet (2.7.10-1) unstable; urgency=low
    
    
      * New upstream release
      * Update breaks/replaces for puppetmaster-common (Closes: #656962)
      * Add systemd services for puppet agent and master
    
     -- Stig Sandbeck Mathisen <email address hidden>  Thu, 26 Jan 2012 11:27:00 +0100
  • puppet (2.7.9-1ubuntu2) precise; urgency=low
    
      * Use maintscript support in dh_installdeb rather than writing out
        dpkg-maintscript-helper commands by hand.  We now simply Pre-Depend on a
        new enough version of dpkg rather than using 'dpkg-maintscript-helper
        supports' guards, leading to more predictable behaviour on upgrades.
     -- Colin Watson <email address hidden>   Sun, 12 Feb 2012 15:07:46 +0000
  • puppet (2.7.9-1ubuntu1) precise; urgency=low
    
      * Merge from Debian testing.  Remaining changes:
        + Add 2 patches to fix incompatibility with Augeas 0.10.0:
          - augeas_saved_files
          - augeas_versioncmp
        + Change Maintainer according to policy
    
    puppet (2.7.9-1) unstable; urgency=low
    
      * New upstream release
    
    puppet (2.7.8-1) unstable; urgency=low
    
      * New upstream release
      * Update dependencies for renamed ruby packages
      * puppet-testsuite: Depend on ruby-sqlite3
     -- Chuck Short <email address hidden>   Wed, 21 Dec 2011 07:00:18 +0000
  • puppet (2.7.6-1ubuntu1) precise; urgency=low
    
      * Add 2 patches to fix incompatibility with Augeas 0.10.0:
          - augeas_saved_files
          - augeas_versioncmp
      * Change Maintainer according to policy.
     -- Raphael Pinson <email address hidden>   Tue, 20 Dec 2011 01:19:12 +0100
  • puppet (2.7.6-1) unstable; urgency=high
    
    
      * New upstream release (CVE-2011-3872)
      * Remove cherry-picked "groupadd_aix_warning" patch
      * Install all new manpages
    
     -- Stig Sandbeck Mathisen <email address hidden>  Sat, 22 Oct 2011 14:08:22 +0000
  • puppet (2.7.1-1ubuntu3.2) oneiric-security; urgency=low
    
      * SECURITY UPDATE: puppet master impersonation via incorrect certificates
        - debian/patches/CVE-2011-3872.patch: refactor certificate handling.
        - Thanks to upstream for providing the patch.
        - CVE-2011-3872
     -- Marc Deslauriers <email address hidden>   Mon, 24 Oct 2011 15:05:12 -0400
  • puppet (2.7.1-1ubuntu3) oneiric; urgency=low
    
      * SECURITY UPDATE: k5login can overwrite arbitrary files as root
        - debian/patches/CVE-2011-3869.patch: adjust type/k5login.rb to securely
          open the file before writing to it as root
        - CVE-2011-3869
      * SECURITY UPDATE: didn't drop privileges before creating and changing
        permissions on SSH keys
        - debian/patches/CVE-2011-3870.patch: adjust ssh_authorized_key/parsed.rb
          to drop privileges before creating the ssh directory and setting
          permissions
        - CVE-2011-3870
      * SECURITY UPDATE: fix predictable temporary filename in ralsh
        - debian/patches/CVE-2011-3871.patch: adjust application/resource.rb to
          use an unpredictable filename
        - CVE-2011-3871
      * SECURITY UPDATE: file indirector injection, similar to CVE-2011-3848
        - secure-indirector-file-backed-terminus-base-cla.patch: Since the
          indirector file backed terminus base class is only used by the test
          suite, remove it and update test cases to use a continuing class.
     -- Jamie Strandboge <email address hidden>   Fri, 30 Sep 2011 08:29:40 -0500