DescriptionPuppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
puppet-module-puppetlabs-apache (PTS)buster3.4.0-1fixed
bookworm, bullseye, sid, trixie5.5.0-2fixed
puppet-module-puppetlabs-apt (PTS)buster, bullseye6.1.1-1fixed
bookworm, sid, trixie9.0.1-1fixed
puppet-module-puppetlabs-mysql (PTS)buster5.3.0-1fixed
bookworm, sid, trixie8.1.0-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Issue in various puppet modules: facter_task, puppet_conf, apt, apache and mysql modules
This is only exploitable with Puppet Tasks, which aren't packaged/available in Debian

Search for package or bug name: Reporting problems