Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/puppet@2.6
purl pkg:gem/puppet@2.6
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-2jc8-n1j4-m7c6
Aliases:
CVE-2012-1053
GHSA-77hg-g8cc-5r37
Puppet Privilege Escallation The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the change_user not dropping supplementary groups in certain conditions, (2) changes to the eguid without associated changes to the egid, or (3) the addition of the real gid to supplementary groups.
2.6.14
Affected by 19 other vulnerabilities.
2.7.11
Affected by 19 other vulnerabilities.
VCID-pgg8-9sk2-57ee
Aliases:
CVE-2012-1989
GHSA-c5qq-g673-5p49
Low severity vulnerability that affects puppet telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
2.7.13
Affected by 19 other vulnerabilities.
VCID-tetf-xa1u-uffv
Aliases:
CVE-2012-1906
GHSA-c4mc-49hq-q275
Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack on a temporary file in /tmp.
2.6.15
Affected by 19 other vulnerabilities.
2.7.13
Affected by 19 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-04T14:30:09.509379+00:00 GHSA Importer Affected by VCID-tetf-xa1u-uffv https://github.com/advisories/GHSA-c4mc-49hq-q275 38.1.0
2026-04-04T14:30:09.266217+00:00 GHSA Importer Affected by VCID-2jc8-n1j4-m7c6 https://github.com/advisories/GHSA-77hg-g8cc-5r37 38.1.0
2026-04-01T15:18:22.727982+00:00 Ruby Importer Affected by VCID-tetf-xa1u-uffv https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1906.yml 38.0.0
2026-04-01T15:18:22.570243+00:00 Ruby Importer Affected by VCID-pgg8-9sk2-57ee https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1989.yml 38.0.0
2026-04-01T15:18:22.478405+00:00 Ruby Importer Affected by VCID-2jc8-n1j4-m7c6 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1053.yml 38.0.0
2026-04-01T12:50:40.177291+00:00 GitLab Importer Affected by VCID-2jc8-n1j4-m7c6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2012-1053.yml 38.0.0
2026-04-01T12:50:27.731687+00:00 GitLab Importer Affected by VCID-tetf-xa1u-uffv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2012-1906.yml 38.0.0