CVE-2015-1029

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-1029
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-1029.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-1029
Related
Published
2015-01-16T16:59:22Z
Modified
2024-11-21T02:24:30Z
Summary
[none]
Details

The puppetlabs-stdlib module 2.1 through 3.0 and 4.1.0 through 4.5.x before 4.5.1 for Puppet 2.8.8 and earlier allows remote authenticated users to gain privileges or obtain sensitive information by prepopulating the fact cache.

References

Affected packages

Debian:11 / puppet-module-puppetlabs-stdlib

Package

Name
puppet-module-puppetlabs-stdlib
Purl
pkg:deb/debian/puppet-module-puppetlabs-stdlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / puppet-module-puppetlabs-stdlib

Package

Name
puppet-module-puppetlabs-stdlib
Purl
pkg:deb/debian/puppet-module-puppetlabs-stdlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / puppet-module-puppetlabs-stdlib

Package

Name
puppet-module-puppetlabs-stdlib
Purl
pkg:deb/debian/puppet-module-puppetlabs-stdlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}