[ubuntu/maverick-security] update-manager, update-manager_0.142.23.1_powerpc_translations.tar.gz, update-manager_0.142.23.1_armel_translations.tar.gz, dist-upgrader_0.142.23.1_all.tar.gz, update-manager_0.142.23.1_amd64_translations.tar.gz, update-manager_0.142.23.1_i386_translations.tar.gz 1:0.142.23.1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Mon Nov 28 16:05:19 UTC 2011


update-manager (1:0.142.23.1) maverick-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via directory traversal
    (LP: #881548)
    - UpdateManager/Core/DistUpgradeFetcherCore.py: verify signature before
      unpacking the tarball.
    - CVE-2011-3152
  * SECURITY UPDATE: information leak via insecure temp file (LP: #881541)
    - DistUpgrade/DistUpgradeViewKDE.py: use mkstemp instead of mktemp.
    - CVE-2011-3154

Date: Wed, 23 Nov 2011 09:29:26 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Michael Vogt <michael.vogt at ubuntu.com>
https://launchpad.net/ubuntu/maverick/+source/update-manager/1:0.142.23.1
-------------- next part --------------
Format: 1.8
Date: Wed, 23 Nov 2011 09:29:26 -0500
Source: update-manager
Binary: update-manager-core update-manager update-manager-hildon update-manager-text update-manager-kde auto-upgrade-tester
Architecture: source
Version: 1:0.142.23.1
Distribution: maverick-security
Urgency: low
Maintainer: Michael Vogt <michael.vogt at ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 auto-upgrade-tester - Test release upgrades in a virtual environment
 update-manager - GNOME application that manages apt updates
 update-manager-core - manage release upgrades
 update-manager-hildon - Hildon application that manages apt updates
 update-manager-kde - Support modules for KPackageKit
 update-manager-text - Text application that manages apt updates
Launchpad-Bugs-Fixed: 881541 881548
Changes: 
 update-manager (1:0.142.23.1) maverick-security; urgency=low
 .
   * SECURITY UPDATE: arbitrary code execution via directory traversal
     (LP: #881548)
     - UpdateManager/Core/DistUpgradeFetcherCore.py: verify signature before
       unpacking the tarball.
     - CVE-2011-3152
   * SECURITY UPDATE: information leak via insecure temp file (LP: #881541)
     - DistUpgrade/DistUpgradeViewKDE.py: use mkstemp instead of mktemp.
     - CVE-2011-3154
Checksums-Sha1: 
 bf43c9c146d8a49322eb21d823f71e7c1279a1e1 1858 update-manager_0.142.23.1.dsc
 4523e062955304ff6f0dd13c19344215b36be194 2914353 update-manager_0.142.23.1.tar.gz
Checksums-Sha256: 
 c4369629acf1e7a55c172f5b89a8d649bf1ddb57f53058968daa4cf418061bd1 1858 update-manager_0.142.23.1.dsc
 174e71009dbf5b9f01ada2767216b46792c4616261843aca6a562a638fb75556 2914353 update-manager_0.142.23.1.tar.gz
Files: 
 881c94cff640b3aa75c7a9ffa7288d23 1858 gnome optional update-manager_0.142.23.1.dsc
 da07aa491b92180d202c1fb95cc41a2c 2914353 gnome optional update-manager_0.142.23.1.tar.gz


More information about the Maverick-changes mailing list