[ubuntu/trusty-proposed] puppet 3.3.1-1ubuntu2 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Mon Jan 6 18:44:14 UTC 2014


puppet (3.3.1-1ubuntu2) trusty; urgency=low

  * SECURITY UPDATE: unsafe use of temp files
    - debian/patches/CVE-2013-4969-3.3.x-temp-file.patch: Use replace_file
      to update a file's contents in lib/puppet/type/file.rb,
      lib/puppet/util.rb, updated tests in
      spec/integration/type/file_spec.rb, spec/unit/type/file_spec.rb.
    - CVE-2013-4969

Date: Mon, 23 Dec 2013 07:57:52 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/puppet/3.3.1-1ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 23 Dec 2013 07:57:52 -0500
Source: puppet
Binary: puppet-common puppet puppetmaster-common puppetmaster puppetmaster-passenger vim-puppet puppet-el puppet-testsuite
Architecture: source
Version: 3.3.1-1ubuntu2
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 puppet     - Centralized configuration management - agent startup and compatib
 puppet-common - Centralized configuration management
 puppet-el  - syntax highlighting for puppet manifests in emacs
 puppet-testsuite - Centralized configuration management - test suite
 puppetmaster - Centralized configuration management - master startup and compati
 puppetmaster-common - Puppet master common scripts
 puppetmaster-passenger - Centralised configuration management - master setup to run under
 vim-puppet - syntax highlighting for puppet manifests in vim
Changes: 
 puppet (3.3.1-1ubuntu2) trusty; urgency=low
 .
   * SECURITY UPDATE: unsafe use of temp files
     - debian/patches/CVE-2013-4969-3.3.x-temp-file.patch: Use replace_file
       to update a file's contents in lib/puppet/type/file.rb,
       lib/puppet/util.rb, updated tests in
       spec/integration/type/file_spec.rb, spec/unit/type/file_spec.rb.
     - CVE-2013-4969
Checksums-Sha1: 
 f2900653993460c7fecdd22a25dc064a1cd16b38 2554 puppet_3.3.1-1ubuntu2.dsc
 a5986f87a2358b36ef574f84d5859473b3ff2e4c 39592 puppet_3.3.1-1ubuntu2.debian.tar.gz
Checksums-Sha256: 
 acc1a9f1e6e6037084c294328530843afccd9e6d6c37fc7c8eae92944069f67f 2554 puppet_3.3.1-1ubuntu2.dsc
 9bc9a6656beb542ac729e8981ddd173bd29f0ce705dc138ec533a79e2d89cf5b 39592 puppet_3.3.1-1ubuntu2.debian.tar.gz
Files: 
 c9551cda0584fe1294974fc59b3722b7 2554 admin optional puppet_3.3.1-1ubuntu2.dsc
 a612ab164d3387ee81060aa2d1d10c4d 39592 admin optional puppet_3.3.1-1ubuntu2.debian.tar.gz
Original-Maintainer: Puppet Package Maintainers <pkg-puppet-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=6Ivq
-----END PGP SIGNATURE-----


More information about the Trusty-changes mailing list