Matthaus Owens
2013-Aug-15 16:10 UTC
[Puppet Users] Announce: Puppet 2.7.23 Available [ Security Release ]
Puppet 2.7.23 is now available. 2.7.23 addresses two security
vulnerabilties discovered in the 2.7.x series of Puppet. These
vulnerabilities have been assigned Mitre CVE numbers CVE-2013-4956 and
CVE-2013-4761.
All users of Puppet 2.7.22 and earlier who cannot upgrade to the
current version of Puppet, 3.2.4, are strongly encouraged to upgrade
to 2.7.23.
For more information on these vulnerabilities, please visit
http://puppetlabs.com/security/cve/cve-2013-4761 and
http://puppetlabs.com/security/cve/cve-2013-4956 .
Downloads are available at:
* Source
https://downloads.puppetlabs.com/puppet/puppet-2.7.23.tar.gz<https://downloads.puppetlabs.com/puppet/puppet-2.7.22.tar.gz>
Windows package is available at
https://downloads.puppetlabs.com/windows/puppet-2.7.23.msi<https://downloads.puppetlabs.com/windows/puppet-2.7.22.msi>
RPMs are available at https://yum.puppetlabs.com/el or /fedora
Debs are available at https://apt.puppetlabs.com
Mac package is available at
https://downloads.puppetlabs.com/mac/puppet-2.7.23.dmg<https://downloads.puppetlabs.com/mac/puppet-2.7.22.dmg>
Gems are available via rubygems at
https://rubygems.org/downloads/puppet-2.7.23.gem<https://rubygems.org/downloads/puppet-2.7.22.gem>
or
by using `gem
install puppet --version=2.7.23`
Please report feedback via the Puppet Labs Redmine site, using an
affected puppet version of 2.7.23:
http://projects.puppetlabs.com/projects/puppet/
## Changelog ##
Andrew Parker (9):
e9b54a0 (Maint) Use dirname instead of regexes
b0924a3 (Maint) Clean up specs
88da2ab (#21971) Check for possible directory traversal
24b18de (#21971) Split import and autoloading code paths
ee80db0 (#21971) Create system for safely dealing with path patterns
c0d0339 (#21971) Fix how import_all loads files
4e00895 (Maint) Confine module tool tests off of windows
78be1de (Maint) Update expectations for older rspec
c9f8717 (Maint) Update test to reflect chown using the gid too
Josh Partlow (3):
18379b6 (#21971) Fixes PathPattern''s usage of Dir.glob for
Windows
94cedf7 (#21971) Allow paths that contain .. as part of a name
ddd8b59 (maint) Fix module_utils regex tests for module file perms
Matthaus Owens (3):
1e5fc90 (packaging) Update CHANGELOG, PUPPETVERSION for 2.7.23
b2a77e0 (packaging) Remove oneiric from ext/build_defaults.yaml
2471c0f (maint) Remove rspec requires from the Rakefile
Pieter van de Bruggen (5):
90d4180 (#14333) Ensure module permissions are sane.
f02f186 Backporting acceptance tests.
23bdf22 Fixing broken requires in the acceptance tests.
b7a0d29 Ensure that PMT uses the correct group membership.
27abe7e Improving testing around PMT module install permissions.
--
You received this message because you are subscribed to the Google Groups
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to puppet-users+unsubscribe@googlegroups.com.
To post to this group, send email to puppet-users@googlegroups.com.
Visit this group at http://groups.google.com/group/puppet-users.
For more options, visit https://groups.google.com/groups/opt_out.
Phips
2013-Aug-15 20:49 UTC
[Puppet Users] Re: Announce: Puppet 2.7.23 Available [ Security Release ]
OpenCSW packages available for test at http://buildfarm.opencsw.org/experimental.html#markp Once somebody tells me they''re good I''ll push them to the main catalog. On Thursday, 15 August 2013 17:10:43 UTC+1, Matthaus Litteken wrote:> > Puppet 2.7.23 is now available. 2.7.23 addresses two security > vulnerabilties discovered in the 2.7.x series of Puppet. These > vulnerabilities have been assigned Mitre CVE numbers CVE-2013-4956 and > CVE-2013-4761. > > All users of Puppet 2.7.22 and earlier who cannot upgrade to the > current version of Puppet, 3.2.4, are strongly encouraged to upgrade > to 2.7.23. > > For more information on these vulnerabilities, please visit > http://puppetlabs.com/security/cve/cve-2013-4761 and > http://puppetlabs.com/security/cve/cve-2013-4956 . > > Downloads are available at: > * Source https://downloads.puppetlabs.com/puppet/puppet-2.7.23.tar.gz<https://downloads.puppetlabs.com/puppet/puppet-2.7.22.tar.gz> > > Windows package is available at > https://downloads.puppetlabs.com/windows/puppet-2.7.23.msi<https://downloads.puppetlabs.com/windows/puppet-2.7.22.msi> > > RPMs are available at https://yum.puppetlabs.com/el or /fedora > > Debs are available at https://apt.puppetlabs.com > > Mac package is available at > https://downloads.puppetlabs.com/mac/puppet-2.7.23.dmg<https://downloads.puppetlabs.com/mac/puppet-2.7.22.dmg> > > Gems are available via rubygems at > https://rubygems.org/downloads/puppet-2.7.23.gem<https://rubygems.org/downloads/puppet-2.7.22.gem> or > by using `gem > install puppet --version=2.7.23` > > Please report feedback via the Puppet Labs Redmine site, using an > affected puppet version of 2.7.23: > http://projects.puppetlabs.com/projects/puppet/ > > ## Changelog ## > > Andrew Parker (9): > e9b54a0 (Maint) Use dirname instead of regexes > b0924a3 (Maint) Clean up specs > 88da2ab (#21971) Check for possible directory traversal > 24b18de (#21971) Split import and autoloading code paths > ee80db0 (#21971) Create system for safely dealing with path patterns > c0d0339 (#21971) Fix how import_all loads files > 4e00895 (Maint) Confine module tool tests off of windows > 78be1de (Maint) Update expectations for older rspec > c9f8717 (Maint) Update test to reflect chown using the gid too > > Josh Partlow (3): > 18379b6 (#21971) Fixes PathPattern''s usage of Dir.glob for Windows > 94cedf7 (#21971) Allow paths that contain .. as part of a name > ddd8b59 (maint) Fix module_utils regex tests for module file perms > > Matthaus Owens (3): > 1e5fc90 (packaging) Update CHANGELOG, PUPPETVERSION for 2.7.23 > b2a77e0 (packaging) Remove oneiric from ext/build_defaults.yaml > 2471c0f (maint) Remove rspec requires from the Rakefile > > Pieter van de Bruggen (5): > 90d4180 (#14333) Ensure module permissions are sane. > f02f186 Backporting acceptance tests. > 23bdf22 Fixing broken requires in the acceptance tests. > b7a0d29 Ensure that PMT uses the correct group membership. > 27abe7e Improving testing around PMT module install permissions. >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users+unsubscribe@googlegroups.com. To post to this group, send email to puppet-users@googlegroups.com. Visit this group at http://groups.google.com/group/puppet-users. For more options, visit https://groups.google.com/groups/opt_out.