Search for packages
| purl | pkg:deb/debian/mcollective@2.0.0%2Bdfsg-2 |
| Next non-vulnerable version | 2.12.1+dfsg-1 |
| Latest non-vulnerable version | 2.12.1+dfsg-1 |
| Risk | 3.6 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6raq-jq1v-cyde
Aliases: CVE-2014-3251 |
Two vulnerabilities have been found in MCollective, the worst of which could lead to privilege escalation. |
Affected by 2 other vulnerabilities. |
|
VCID-7ypq-wmb7-quhc
Aliases: CVE-2014-3248 GHSA-92v7-pq4h-58j5 |
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. |
Affected by 2 other vulnerabilities. |
|
VCID-casd-wvax-8yde
Aliases: CVE-2016-2788 |
mcollective: Improper validation of fields in MCollective pings |
Affected by 0 other vulnerabilities. |
|
VCID-e88t-j5b4-s7ba
Aliases: CVE-2017-2292 |
A vulnerability in MCollective might allow remote attackers to execute arbitrary code. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||