svn commit: r420182 - head/security/vuxml
Romain Tartière
romain at FreeBSD.org
Sun Aug 14 08:33:16 UTC 2016
Author: romain
Date: Sun Aug 14 08:33:15 2016
New Revision: 420182
URL: https://svnweb.freebsd.org/changeset/ports/420182
Log:
Add entry for CVE-2015-7331
mcollective-puppet-agent -- Remote Code Execution in mcollective-puppet-agent plugin
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun Aug 14 07:40:16 2016 (r420181)
+++ head/security/vuxml/vuln.xml Sun Aug 14 08:33:15 2016 (r420182)
@@ -58,6 +58,32 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="df502a2f-61f6-11e6-a461-643150d3111d">
+ <topic>mcollective-puppet-agent -- Remote Code Execution in mcollective-puppet-agent plugin</topic>
+ <affects>
+ <package>
+ <name>mcollective-puppet-agent</name>
+ <range><lt>1.11.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Puppet reports:</p>
+ <blockquote cite="https://puppet.com/security/cve/cve-2015-7331">
+ <p>Puppet Enterprise previously included a puppet-agent MCollective plugin that allowed you to pass the `--server` argument to MCollective. This insecure argument enabled remote code execution via connection to an untrusted host. The puppet-agent MCollective version included in PE 2016.2.1, this option is disabled by default.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://puppet.com/security/cve/cve-2015-7331</url>
+ <cvename>CVE-2015-7331</cvename>
+ </references>
+ <dates>
+ <discovery>2016-08-09</discovery>
+ <entry>2016-08-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7d4f4955-600a-11e6-a6c3-14dae9d210b8">
<topic>FreeBSD -- Heap vulnerability in bspatch</topic>
<affects>
More information about the svn-ports-head
mailing list