aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorRomain Tartière <romain@FreeBSD.org>2021-11-10 06:30:21 +0000
committerRomain Tartière <romain@FreeBSD.org>2021-11-10 06:31:25 +0000
commitfca6e90dd2c0a379013000e4452cc3457ca0fcae (patch)
treeee5aa54f4d52d7d46e1b534bd37235ea74799887 /security/vuxml
parenta55c182ab0a7408eda8401a60a99d3b43ed49ce8 (diff)
downloadports-fca6e90dd2c0a379013000e4452cc3457ca0fcae.tar.gz
ports-fca6e90dd2c0a379013000e4452cc3457ca0fcae.zip
security/vuxml: Document latest Puppet issues
* CVE-2021-27023 * CVE-2021-27025
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln-2021.xml68
1 files changed, 68 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 9f278b10665c..a1e3a9c26a5b 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,71 @@
+ <vuln vid="bfea59e0-41ee-11ec-9bac-589cfc007716">
+ <topic>puppet -- Silent Configuration Failure</topic>
+ <affects>
+ <package>
+ <name>puppet6</name>
+ <range><lt>6.25.1</lt></range>
+ </package>
+ <package>
+ <name>puppet7</name>
+ <range><lt>7.12.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Puppet reports:</p>
+ <blockquote cite="https://puppet.com/security/cve/cve-2021-27025">
+ <p>A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first pluginsync.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-27025</cvename>
+ <url>https://puppet.com/security/cve/cve-2021-27025</url>
+ </references>
+ <dates>
+ <discovery>2021-11-09</discovery>
+ <entry>2021-11-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3bd3c9f8-41ee-11ec-9bac-589cfc007716">
+ <topic>puppet -- Unsafe HTTP Redirect</topic>
+ <affects>
+ <package>
+ <name>puppet6</name>
+ <range><lt>6.25.1</lt></range>
+ </package>
+ <package>
+ <name>puppet7</name>
+ <range><lt>7.12.1</lt></range>
+ </package>
+ <package>
+ <name>puppetserver6</name>
+ <range><lt>6.17.1</lt></range>
+ </package>
+ <package>
+ <name>puppetserver7</name>
+ <range><lt>7.4.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Puppet reports:</p>
+ <blockquote cite="https://puppet.com/security/cve/cve-2021-27023">
+ <p>A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-27023</cvename>
+ <url>https://puppet.com/security/cve/cve-2021-27023</url>
+ </references>
+ <dates>
+ <discovery>2021-11-09</discovery>
+ <entry>2021-11-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="646923b0-41c7-11ec-a3b2-005056a311d1">
<topic>samba -- Multiple Vulnerabilities</topic>
<affects>