[ubuntu/zesty-proposed] kio 5.31.0-0ubuntu2 (Accepted)
Rik Mills
rikmills at kubuntu.org
Thu Mar 2 22:05:21 UTC 2017
kio (5.31.0-0ubuntu2) zesty; urgency=medium
* SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
- No CVE number.
- fixes (LP: #1668871)
Date: Thu, 02 Mar 2017 21:55:03 +0000
Changed-By: Rik Mills <rikmills at kubuntu.org>
Maintainer: Debian/Kubuntu Qt/KDE Maintainers <debian-qt-kde at lists.debian.org>
https://launchpad.net/ubuntu/+source/kio/5.31.0-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 02 Mar 2017 21:55:03 +0000
Source: kio
Binary: libkf5kio-dev kio libkf5kiocore5 libkf5kiofilewidgets5 libkf5kiogui5 libkf5kiontlm5 libkf5kiowidgets5 kio-dev
Architecture: source
Version: 5.31.0-0ubuntu2
Distribution: zesty
Urgency: medium
Maintainer: Debian/Kubuntu Qt/KDE Maintainers <debian-qt-kde at lists.debian.org>
Changed-By: Rik Mills <rikmills at kubuntu.org>
Description:
kio - Resource and network access abstraction
kio-dev - transitional dummy package
libkf5kio-dev - Resource and network access abstraction
libkf5kiocore5 - Resource and network access abstraction
libkf5kiofilewidgets5 - Resource and network access abstraction
libkf5kiogui5 - Resource and network access abstraction
libkf5kiontlm5 - Resource and network access abstraction
libkf5kiowidgets5 - Resource and network access abstraction
Launchpad-Bugs-Fixed: 1668871
Changes:
kio (5.31.0-0ubuntu2) zesty; urgency=medium
.
* SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
- No CVE number.
- fixes (LP: #1668871)
Checksums-Sha1:
7fb1d24600293b39e8630d0257122fb722db783b 3491 kio_5.31.0-0ubuntu2.dsc
53899685b15f89edd8d5de8a207f14d9ccf00cb9 40128 kio_5.31.0-0ubuntu2.debian.tar.xz
Checksums-Sha256:
15ad14fcee5cae0aff20ad063cee3991184f0d5b80cae50e122f48d995e79b5f 3491 kio_5.31.0-0ubuntu2.dsc
4f59120ab58dedef6fdcde215d2a9b10f1f22b67be3478897451785b41518330 40128 kio_5.31.0-0ubuntu2.debian.tar.xz
Files:
5038e66ade02186e5132d9239b40d84a 3491 libs optional kio_5.31.0-0ubuntu2.dsc
d055d2e9f80feb2e14d31211dab5d02f 40128 libs optional kio_5.31.0-0ubuntu2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=lvm/
-----END PGP SIGNATURE-----
More information about the Zesty-changes
mailing list