Dennis Rowe discovered that Puppet incorrectly handled the search path. A local attacker could use this issue to possibly execute arbitrary code. (CVE-2014-3248)
It was discovered that Puppet incorrectly handled YAML deserialization. A remote attacker could possibly use this issue to execute arbitrary code on the master. This update is incompatible with agents older than 3.2.2. (CVE-2017-2295)
{ "availability": "No subscription required", "binaries": [ { "binary_name": "puppet", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppet-common", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppet-el", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppet-testsuite", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppetmaster", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppetmaster-common", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "puppetmaster-passenger", "binary_version": "3.4.3-1ubuntu1.2" }, { "binary_name": "vim-puppet", "binary_version": "3.4.3-1ubuntu1.2" } ] }