[ubuntu/natty] systemtap 1.3-1ubuntu2 (Accepted)
Steve Beattie
sbeattie at ubuntu.com
Tue Nov 23 20:00:28 GMT 2010
systemtap (1.3-1ubuntu2) natty; urgency=low
[ Lorenzo De Liso ]
* SECURITY UPDATE: staprun module loading/unloading security fixes
(LP: #677226)
- debian/patches/CVE-2010-4170+CVE-2010-4171.patch
- CVE 2010-4170
- CVE 2010-4171
[ Steve Beattie ]
* debian/rules, debian/systemtap-runtime.postinst: restrict
executable access to group stapusr to match upstream intent
Date: Fri, 19 Nov 2010 15:32:49 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/natty/+source/systemtap/1.3-1ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 19 Nov 2010 15:32:49 -0800
Source: systemtap
Binary: systemtap systemtap-common systemtap-runtime systemtap-doc systemtap-server systemtap-client systemtap-sdt-dev systemtap-grapher
Architecture: source
Version: 1.3-1ubuntu2
Distribution: natty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description:
systemtap - instrumentation system for Linux 2.6
systemtap-client - instrumentation system for Linux 2.6 (client for compile server)
systemtap-common - instrumentation system for Linux 2.6 (common component)
systemtap-doc - documentation and examples for SystemTap
systemtap-grapher - instrumentation system for Linux 2.6 (grapher)
systemtap-runtime - instrumentation system for Linux 2.6 (runtime component)
systemtap-sdt-dev - statically defined probes development files
systemtap-server - instrumentation system for Linux 2.6 (compile server)
Launchpad-Bugs-Fixed: 677226
Changes:
systemtap (1.3-1ubuntu2) natty; urgency=low
.
[ Lorenzo De Liso ]
* SECURITY UPDATE: staprun module loading/unloading security fixes
(LP: #677226)
- debian/patches/CVE-2010-4170+CVE-2010-4171.patch
- CVE 2010-4170
- CVE 2010-4171
.
[ Steve Beattie ]
* debian/rules, debian/systemtap-runtime.postinst: restrict
executable access to group stapusr to match upstream intent
Checksums-Sha1:
932610a8ecd8259be2ec3d8a8ea37f6753bf972c 2436 systemtap_1.3-1ubuntu2.dsc
882c90079b108bfc918ef6248f4ab22235e7e06e 26397 systemtap_1.3-1ubuntu2.debian.tar.gz
Checksums-Sha256:
70c09e3c23c7e0075e03bb3f396b651bc570774c7ac862398943339da16ce82f 2436 systemtap_1.3-1ubuntu2.dsc
bac674e8a59da63e76a769683e4f497967c9e188ef70bae7bb98a0e83fdd0ca1 26397 systemtap_1.3-1ubuntu2.debian.tar.gz
Files:
3638a8cd31b96187170b1ef55db41203 2436 devel optional systemtap_1.3-1ubuntu2.dsc
3cb2e10b24b20e26d435d704dc164962 26397 devel optional systemtap_1.3-1ubuntu2.debian.tar.gz
Original-Maintainer: Ritesh Raj Sarraf <rrs at debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQIcBAEBCgAGBQJM7BwnAAoJEGVp2FWnRL6TcV8P/05GY0xXAh90UkEShdf8MYtP
/xxWP32jlZxx98BzyuzXMhqhQZdch7BW/6ZqM31Ozmvkj0tUh37JgmuSKmPA83kg
KhemkmP+J5EO5ntuh36wgJbiiPcY78JfPN9rndhTVH2viGy7+A0VRh8M+fMMTKrO
UmhKf2Xx3CjA+JFpIsxVxnVYI/kV4GCu9xOtUNRMXkJjRDQHkabUtBIziytFGNud
9LG41j7dDNrJKFfXYmxA9J5N2F5eqEiXa6lY5T9oqo4XwlLrFSnbv51SL/vj2Rhy
OA/gEbF9L3dGSO1/hjLjZsbidyB5vr4c1XG/LjOuYkf6uP0lS5HFBXI/HdhYwquR
XGbpMTU0uGO2HSaWRxKzJnN8jxuiLsjqpHNks0RAkyrtdUx1pGYkJy96RLBm14Ug
f5gT9bgT9QQ8Eqbq56WnnUlq87l60rWRV4+8QBmVkepNY1L5J6U+BAmBesOdZD+Z
qoaEe/MuLnw933+SMcGT5dYQpiJpNR2ZLjHi5NgS4MdHIebGUdSu6wzS+Dd3QZxQ
YASsX9Q+RCplR9URF7+so4BmcaDSIpscLufllwvrBPeVK/9hPxw5IErM1TTRlib/
6W42mkotjuzDUM1uhICt60TiBALZxmdjuuaeQjPW9ITMqJs+r60tdn1YhpAQTfx0
zn4LZgM4622yfTxkkR6A
=DjGd
-----END PGP SIGNATURE-----
More information about the Natty-changes
mailing list