[ubuntu/utopic-proposed] transmission 2.82-1.1ubuntu4 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Wed Jul 16 12:19:22 UTC 2014


transmission (2.82-1.1ubuntu4) utopic; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    overflow in tr_bitfieldEnsureNthBitAlloced
    - debian/patches/CVE-2014-4909.patch: properly handle bitfields in
      libtransmission/bitfield.c, handle invalid blocks in
      libtransmission/peer-msgs.c.
    - CVE-2014-4909

Date: Fri, 11 Jul 2014 14:07:01 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/utopic/+source/transmission/2.82-1.1ubuntu4
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 11 Jul 2014 14:07:01 -0400
Source: transmission
Binary: transmission transmission-common transmission-dbg transmission-cli transmission-gtk transmission-qt transmission-daemon
Architecture: source
Version: 2.82-1.1ubuntu4
Distribution: utopic
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 transmission - lightweight BitTorrent client
 transmission-cli - lightweight BitTorrent client (command line programs)
 transmission-common - lightweight BitTorrent client (common files)
 transmission-daemon - lightweight BitTorrent client (daemon)
 transmission-dbg - lightweight BitTorrent client (debug symbols)
 transmission-gtk - lightweight BitTorrent client (GTK+ interface)
 transmission-qt - lightweight BitTorrent client (Qt interface)
Changes:
 transmission (2.82-1.1ubuntu4) utopic; urgency=medium
 .
   * SECURITY UPDATE: denial of service and possible code execution via
     overflow in tr_bitfieldEnsureNthBitAlloced
     - debian/patches/CVE-2014-4909.patch: properly handle bitfields in
       libtransmission/bitfield.c, handle invalid blocks in
       libtransmission/peer-msgs.c.
     - CVE-2014-4909
Checksums-Sha1:
 684539fbc22ea126cc6a7603ffb79ca365821731 2773 transmission_2.82-1.1ubuntu4.dsc
 5192219b7f150fe51e757813cc2ca3b8cee24e23 19080 transmission_2.82-1.1ubuntu4.debian.tar.xz
Checksums-Sha256:
 68b7b56884c86f2255a51bcd26182e273211e29c8d628d63174df1201823a4f3 2773 transmission_2.82-1.1ubuntu4.dsc
 ed8b6ddefa123e06cd4413791bf5cad30b7a93f15ff9d92824c38d8b0d6575d2 19080 transmission_2.82-1.1ubuntu4.debian.tar.xz
Files:
 0e6c0bafb9bee3a64eec31a93a5e72db 2773 net optional transmission_2.82-1.1ubuntu4.dsc
 3e71506406b1fcb89be25e0ba651a044 19080 net optional transmission_2.82-1.1ubuntu4.debian.tar.xz
Original-Maintainer: Leo Costela <costela at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=dMhl
-----END PGP SIGNATURE-----


More information about the Utopic-changes mailing list