Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local
users to overwrite arbitrary files via a symlink attack on the (1)
/tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or
(4) /tmp/puppetdoc.aux temporary file.
Please provide an updated ebuild or bump to a fixed version.
The awareness for this bug is low, because stabilisation happens in 306195, which does not make it clear that there is a vulnerability to fix.
All supported archs are at stable version 0.25.4-r1 in portage, this bug should not affect anyone without explicit portage masking of newer version. The only affected ebuild in portage is 0.24.8-r1, upstream already pushed out 0.24.9 and considers 0.24.x "legacy".
GLSA Vote: Yes.
Yes, too, GLSA request filed.
This issue was resolved and addressed in
GLSA 201203-03 at http://security.gentoo.org/glsa/glsa-201203-03.xml
by GLSA coordinator Sean Amoss (ackle).