[ubuntu/natty] systemtap 1.3-1ubuntu2 (Accepted)

Steve Beattie sbeattie at ubuntu.com
Tue Nov 23 20:00:28 GMT 2010


systemtap (1.3-1ubuntu2) natty; urgency=low

  [ Lorenzo De Liso ]
  * SECURITY UPDATE: staprun module loading/unloading security fixes
    (LP: #677226)
    - debian/patches/CVE-2010-4170+CVE-2010-4171.patch
    - CVE 2010-4170
    - CVE 2010-4171

  [ Steve Beattie ]
  * debian/rules, debian/systemtap-runtime.postinst: restrict
    executable access to group stapusr to match upstream intent

Date: Fri, 19 Nov 2010 15:32:49 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/natty/+source/systemtap/1.3-1ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 19 Nov 2010 15:32:49 -0800
Source: systemtap
Binary: systemtap systemtap-common systemtap-runtime systemtap-doc systemtap-server systemtap-client systemtap-sdt-dev systemtap-grapher
Architecture: source
Version: 1.3-1ubuntu2
Distribution: natty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description: 
 systemtap  - instrumentation system for Linux 2.6
 systemtap-client - instrumentation system for Linux 2.6 (client for compile server)
 systemtap-common - instrumentation system for Linux 2.6 (common component)
 systemtap-doc - documentation and examples for SystemTap
 systemtap-grapher - instrumentation system for Linux 2.6 (grapher)
 systemtap-runtime - instrumentation system for Linux 2.6 (runtime component)
 systemtap-sdt-dev - statically defined probes development files
 systemtap-server - instrumentation system for Linux 2.6 (compile server)
Launchpad-Bugs-Fixed: 677226
Changes: 
 systemtap (1.3-1ubuntu2) natty; urgency=low
 .
   [ Lorenzo De Liso ]
   * SECURITY UPDATE: staprun module loading/unloading security fixes
     (LP: #677226)
     - debian/patches/CVE-2010-4170+CVE-2010-4171.patch
     - CVE 2010-4170
     - CVE 2010-4171
 .
   [ Steve Beattie ]
   * debian/rules, debian/systemtap-runtime.postinst: restrict
     executable access to group stapusr to match upstream intent
Checksums-Sha1: 
 932610a8ecd8259be2ec3d8a8ea37f6753bf972c 2436 systemtap_1.3-1ubuntu2.dsc
 882c90079b108bfc918ef6248f4ab22235e7e06e 26397 systemtap_1.3-1ubuntu2.debian.tar.gz
Checksums-Sha256: 
 70c09e3c23c7e0075e03bb3f396b651bc570774c7ac862398943339da16ce82f 2436 systemtap_1.3-1ubuntu2.dsc
 bac674e8a59da63e76a769683e4f497967c9e188ef70bae7bb98a0e83fdd0ca1 26397 systemtap_1.3-1ubuntu2.debian.tar.gz
Files: 
 3638a8cd31b96187170b1ef55db41203 2436 devel optional systemtap_1.3-1ubuntu2.dsc
 3cb2e10b24b20e26d435d704dc164962 26397 devel optional systemtap_1.3-1ubuntu2.debian.tar.gz
Original-Maintainer: Ritesh Raj Sarraf <rrs at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=DjGd
-----END PGP SIGNATURE-----


More information about the Natty-changes mailing list