puppet (2.7.18-1ubuntu2) raring; urgency=low

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/security-mar-2013.patch: upstream patch to fix
      multiple security issues.
    - CVE-2013-1640 - Remote code execution on master from authenticated clients
    - CVE-2013-1652 - Insufficient input validation
    - CVE-2013-1653 - Remote code execution
    - CVE-2013-1654 - Protocol downgrade
    - CVE-2013-1655 - Unauthenticated remote code execution risk
    - CVE-2013-2275 - Incorrect default report ACL

Date: Mon, 11 Mar 2013 11:16:08 -0400
Changed-By: Marc Deslauriers <[email protected]>
Maintainer: Ubuntu Developers <[email protected]>
https://launchpad.net/ubuntu/raring/+source/puppet/2.7.18-1ubuntu2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 11 Mar 2013 11:16:08 -0400
Source: puppet
Binary: puppet-common puppet puppetmaster-common puppetmaster 
puppetmaster-passenger vim-puppet puppet-el puppet-testsuite
Architecture: source
Version: 2.7.18-1ubuntu2
Distribution: raring
Urgency: low
Maintainer: Ubuntu Developers <[email protected]>
Changed-By: Marc Deslauriers <[email protected]>
Description: 
 puppet     - Centralized configuration management - agent startup and compatib
 puppet-common - Centralized configuration management
 puppet-el  - syntax highlighting for puppet manifests in emacs
 puppet-testsuite - Centralized configuration management - test suite
 puppetmaster - Centralized configuration management - master startup and 
compati
 puppetmaster-common - Puppet master common scripts
 puppetmaster-passenger - Centralised configuration management - master setup 
to run under
 vim-puppet - syntax highlighting for puppet manifests in vim
Changes: 
 puppet (2.7.18-1ubuntu2) raring; urgency=low
 .
   * SECURITY UPDATE: Multiple security issues
     - debian/patches/security-mar-2013.patch: upstream patch to fix
       multiple security issues.
     - CVE-2013-1640 - Remote code execution on master from authenticated 
clients
     - CVE-2013-1652 - Insufficient input validation
     - CVE-2013-1653 - Remote code execution
     - CVE-2013-1654 - Protocol downgrade
     - CVE-2013-1655 - Unauthenticated remote code execution risk
     - CVE-2013-2275 - Incorrect default report ACL
Checksums-Sha1: 
 be31479edc39c2e222689425793d2db6a7acf10d 2552 puppet_2.7.18-1ubuntu2.dsc
 b961acd622507b6139cc55c7920dc9c57f035d18 52079 
puppet_2.7.18-1ubuntu2.debian.tar.gz
Checksums-Sha256: 
 448f998c4c285420c1b48a79ba93f59c34e916b2c112c0091cd8d7fbedc327ee 2552 
puppet_2.7.18-1ubuntu2.dsc
 5cf8e5f6758522d48653376d4aee625b197438a363343192573cba79cc562dfc 52079 
puppet_2.7.18-1ubuntu2.debian.tar.gz
Files: 
 33ff17df28526d8b5814d469e68dc28e 2552 admin optional puppet_2.7.18-1ubuntu2.dsc
 ab421c65ec2e6af1f338e44dc7901726 52079 admin optional 
puppet_2.7.18-1ubuntu2.debian.tar.gz
Original-Maintainer: Puppet Package Maintainers 
<[email protected]>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=tYV6
-----END PGP SIGNATURE-----
-- 
Raring-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/raring-changes

Reply via email to