[ubuntu/trusty-proposed] puppet 3.3.1-1ubuntu2 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Mon Jan 6 18:44:14 UTC 2014
puppet (3.3.1-1ubuntu2) trusty; urgency=low
* SECURITY UPDATE: unsafe use of temp files
- debian/patches/CVE-2013-4969-3.3.x-temp-file.patch: Use replace_file
to update a file's contents in lib/puppet/type/file.rb,
lib/puppet/util.rb, updated tests in
spec/integration/type/file_spec.rb, spec/unit/type/file_spec.rb.
- CVE-2013-4969
Date: Mon, 23 Dec 2013 07:57:52 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/puppet/3.3.1-1ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 23 Dec 2013 07:57:52 -0500
Source: puppet
Binary: puppet-common puppet puppetmaster-common puppetmaster puppetmaster-passenger vim-puppet puppet-el puppet-testsuite
Architecture: source
Version: 3.3.1-1ubuntu2
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
puppet - Centralized configuration management - agent startup and compatib
puppet-common - Centralized configuration management
puppet-el - syntax highlighting for puppet manifests in emacs
puppet-testsuite - Centralized configuration management - test suite
puppetmaster - Centralized configuration management - master startup and compati
puppetmaster-common - Puppet master common scripts
puppetmaster-passenger - Centralised configuration management - master setup to run under
vim-puppet - syntax highlighting for puppet manifests in vim
Changes:
puppet (3.3.1-1ubuntu2) trusty; urgency=low
.
* SECURITY UPDATE: unsafe use of temp files
- debian/patches/CVE-2013-4969-3.3.x-temp-file.patch: Use replace_file
to update a file's contents in lib/puppet/type/file.rb,
lib/puppet/util.rb, updated tests in
spec/integration/type/file_spec.rb, spec/unit/type/file_spec.rb.
- CVE-2013-4969
Checksums-Sha1:
f2900653993460c7fecdd22a25dc064a1cd16b38 2554 puppet_3.3.1-1ubuntu2.dsc
a5986f87a2358b36ef574f84d5859473b3ff2e4c 39592 puppet_3.3.1-1ubuntu2.debian.tar.gz
Checksums-Sha256:
acc1a9f1e6e6037084c294328530843afccd9e6d6c37fc7c8eae92944069f67f 2554 puppet_3.3.1-1ubuntu2.dsc
9bc9a6656beb542ac729e8981ddd173bd29f0ce705dc138ec533a79e2d89cf5b 39592 puppet_3.3.1-1ubuntu2.debian.tar.gz
Files:
c9551cda0584fe1294974fc59b3722b7 2554 admin optional puppet_3.3.1-1ubuntu2.dsc
a612ab164d3387ee81060aa2d1d10c4d 39592 admin optional puppet_3.3.1-1ubuntu2.debian.tar.gz
Original-Maintainer: Puppet Package Maintainers <pkg-puppet-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)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=6Ivq
-----END PGP SIGNATURE-----
More information about the Trusty-changes
mailing list