puppet (2.7.11-1ubuntu2.1) precise-security; urgency=low

  * SECURITY UPDATE: Multiple July 2012 security issues
    - debian/patches/2.7.17-Puppet-July-2012-CVE-fixes.patch: upstream
      patch to fix multiple security issues.
    - CVE-2012-3864: arbitrary file read on master from authenticated
      clients
    - CVE-2012-3865: arbitrary file delete or denial of service on master
      from authenticated clients
    - CVE-2012-3866: last_run_report.yaml report file is world readable and
      leads to arbitrary file read on master by an agent
    - CVE-2012-3867: insufficient input validation for agent cert hostnames

Date: Tue, 10 Jul 2012 07:58:03 -0400
Changed-By: Marc Deslauriers <[email protected]>
Maintainer: Ubuntu Developers <[email protected]>
https://launchpad.net/ubuntu/precise/+source/puppet/2.7.11-1ubuntu2.1
Format: 1.8
Date: Tue, 10 Jul 2012 07:58:03 -0400
Source: puppet
Binary: puppet-common puppet puppetmaster-common puppetmaster 
puppetmaster-passenger vim-puppet puppet-el puppet-testsuite
Architecture: source
Version: 2.7.11-1ubuntu2.1
Distribution: precise-security
Urgency: low
Maintainer: Ubuntu Developers <[email protected]>
Changed-By: Marc Deslauriers <[email protected]>
Description: 
 puppet     - Centralized configuration management - agent startup and compatib
 puppet-common - Centralized configuration management
 puppet-el  - syntax highlighting for puppet manifests in emacs
 puppet-testsuite - Centralized configuration management - test suite
 puppetmaster - Centralized configuration management - master startup and 
compati
 puppetmaster-common - Puppet master common scripts
 puppetmaster-passenger - Centralised configuration management - master setup 
to run under
 vim-puppet - syntax highlighting for puppet manifests in vim
Changes: 
 puppet (2.7.11-1ubuntu2.1) precise-security; urgency=low
 .
   * SECURITY UPDATE: Multiple July 2012 security issues
     - debian/patches/2.7.17-Puppet-July-2012-CVE-fixes.patch: upstream
       patch to fix multiple security issues.
     - CVE-2012-3864: arbitrary file read on master from authenticated
       clients
     - CVE-2012-3865: arbitrary file delete or denial of service on master
       from authenticated clients
     - CVE-2012-3866: last_run_report.yaml report file is world readable and
       leads to arbitrary file read on master by an agent
     - CVE-2012-3867: insufficient input validation for agent cert hostnames
Checksums-Sha1: 
 b6b83605a96eb3ec5c5b031972150b85f3dc7de7 2593 puppet_2.7.11-1ubuntu2.1.dsc
 162b9ff5edc9f975819ff582f924848f03b29865 61181 
puppet_2.7.11-1ubuntu2.1.debian.tar.gz
Checksums-Sha256: 
 504e0182caaf8affb97622dc0c7c4d9fdc45eacb9eb926129a5361487d4d7205 2593 
puppet_2.7.11-1ubuntu2.1.dsc
 430107d113e4684e867afe80450126d874e9709717b0756a849594866c64e35c 61181 
puppet_2.7.11-1ubuntu2.1.debian.tar.gz
Files: 
 e67a392bd5f25debd76552158d98a9fb 2593 admin optional 
puppet_2.7.11-1ubuntu2.1.dsc
 de3559dd46ce5e90a457b5b9cfec919d 61181 admin optional 
puppet_2.7.11-1ubuntu2.1.debian.tar.gz
Original-Maintainer: Puppet Package Maintainers 
<[email protected]>
-- 
Precise-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/precise-changes

Reply via email to