[ubuntu/lucid-security] oprofile 0.9.6-1ubuntu4.4 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Mon Jul 11 14:03:24 UTC 2011


oprofile (0.9.6-1ubuntu4.4) lucid-security; urgency=low

  * SECURITY UPDATE: shell metacharacter injection via -e argument
    - 0001-Sanitize-Event-Names.patch: only allow alphanumerics with -e
    - CVE-2011-1760
  * SECURITY UDPATE: shell metacharacter injection via --vmlinux,
    --session-dir and --xen
    - 0003-Avoid-blindly-source-SETUP_FILE-with.patch: don't execute commands
      in $SETUP_FILE
    - 0004-Do-additional-checks-on-user-supplied-arguments.patch: input
      validation on user supplied values
    - CVE-2011-2471
  * SECURITY UPDATE: directory traversal vulnerability via --save and
    --session-dir
    - 0002-Ensure-that-save-only-saves-things-in-SESSION_DIR.patch
    - 0005-add-back-error_if_not_basename.patch: readd error_if_not_basename()
      which was removed in 0003-Avoid-blindly-source-SETUP_FILE-with.patch
    - CVE-2011-2472

Date: Thu, 07 Jul 2011 11:00:26 -0500
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/oprofile/0.9.6-1ubuntu4.4
-------------- next part --------------
Format: 1.8
Date: Thu, 07 Jul 2011 11:00:26 -0500
Source: oprofile
Binary: oprofile libopagent1 oprofile-gui
Architecture: source
Version: 0.9.6-1ubuntu4.4
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 libopagent1 - system-wide profiler for Linux systems (opagent runtime library)
 oprofile   - system-wide profiler for Linux systems
 oprofile-gui - system-wide profiler for Linux systems (GUI components)
Changes: 
 oprofile (0.9.6-1ubuntu4.4) lucid-security; urgency=low
 .
   * SECURITY UPDATE: shell metacharacter injection via -e argument
     - 0001-Sanitize-Event-Names.patch: only allow alphanumerics with -e
     - CVE-2011-1760
   * SECURITY UDPATE: shell metacharacter injection via --vmlinux,
     --session-dir and --xen
     - 0003-Avoid-blindly-source-SETUP_FILE-with.patch: don't execute commands
       in $SETUP_FILE
     - 0004-Do-additional-checks-on-user-supplied-arguments.patch: input
       validation on user supplied values
     - CVE-2011-2471
   * SECURITY UPDATE: directory traversal vulnerability via --save and
     --session-dir
     - 0002-Ensure-that-save-only-saves-things-in-SESSION_DIR.patch
     - 0005-add-back-error_if_not_basename.patch: readd error_if_not_basename()
       which was removed in 0003-Avoid-blindly-source-SETUP_FILE-with.patch
     - CVE-2011-2472
Checksums-Sha1: 
 3c288c0ea91f1cbc55feefa091c32681ad64f226 2192 oprofile_0.9.6-1ubuntu4.4.dsc
 0a9708a7d27bd8d811863c3f8d4b359b15516802 19077 oprofile_0.9.6-1ubuntu4.4.diff.gz
Checksums-Sha256: 
 5f4686c4143857dfe3b7ea15c19e80fa9739183aaccf2002a96b5d95b2a74284 2192 oprofile_0.9.6-1ubuntu4.4.dsc
 253215a8aca7fe46915c413448bc84f1bd088f8f66fbfe7c72e899d231d0d9cd 19077 oprofile_0.9.6-1ubuntu4.4.diff.gz
Files: 
 ca88a20eb6e676a330e9f0bb88241bd1 2192 devel optional oprofile_0.9.6-1ubuntu4.4.dsc
 c230b777d62fd3d3d26667cd08890596 19077 devel optional oprofile_0.9.6-1ubuntu4.4.diff.gz
Original-Maintainer: LIU Qi <liuqi82 at gmail.com>


More information about the Lucid-changes mailing list