[ubuntu/maverick-security] update-manager, update-manager_0.142.23.1_powerpc_translations.tar.gz, update-manager_0.142.23.1_armel_translations.tar.gz, dist-upgrader_0.142.23.1_all.tar.gz, update-manager_0.142.23.1_amd64_translations.tar.gz, update-manager_0.142.23.1_i386_translations.tar.gz 1:0.142.23.1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Mon Nov 28 16:05:19 UTC 2011
update-manager (1:0.142.23.1) maverick-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via directory traversal
(LP: #881548)
- UpdateManager/Core/DistUpgradeFetcherCore.py: verify signature before
unpacking the tarball.
- CVE-2011-3152
* SECURITY UPDATE: information leak via insecure temp file (LP: #881541)
- DistUpgrade/DistUpgradeViewKDE.py: use mkstemp instead of mktemp.
- CVE-2011-3154
Date: Wed, 23 Nov 2011 09:29:26 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Michael Vogt <michael.vogt at ubuntu.com>
https://launchpad.net/ubuntu/maverick/+source/update-manager/1:0.142.23.1
-------------- next part --------------
Format: 1.8
Date: Wed, 23 Nov 2011 09:29:26 -0500
Source: update-manager
Binary: update-manager-core update-manager update-manager-hildon update-manager-text update-manager-kde auto-upgrade-tester
Architecture: source
Version: 1:0.142.23.1
Distribution: maverick-security
Urgency: low
Maintainer: Michael Vogt <michael.vogt at ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
auto-upgrade-tester - Test release upgrades in a virtual environment
update-manager - GNOME application that manages apt updates
update-manager-core - manage release upgrades
update-manager-hildon - Hildon application that manages apt updates
update-manager-kde - Support modules for KPackageKit
update-manager-text - Text application that manages apt updates
Launchpad-Bugs-Fixed: 881541 881548
Changes:
update-manager (1:0.142.23.1) maverick-security; urgency=low
.
* SECURITY UPDATE: arbitrary code execution via directory traversal
(LP: #881548)
- UpdateManager/Core/DistUpgradeFetcherCore.py: verify signature before
unpacking the tarball.
- CVE-2011-3152
* SECURITY UPDATE: information leak via insecure temp file (LP: #881541)
- DistUpgrade/DistUpgradeViewKDE.py: use mkstemp instead of mktemp.
- CVE-2011-3154
Checksums-Sha1:
bf43c9c146d8a49322eb21d823f71e7c1279a1e1 1858 update-manager_0.142.23.1.dsc
4523e062955304ff6f0dd13c19344215b36be194 2914353 update-manager_0.142.23.1.tar.gz
Checksums-Sha256:
c4369629acf1e7a55c172f5b89a8d649bf1ddb57f53058968daa4cf418061bd1 1858 update-manager_0.142.23.1.dsc
174e71009dbf5b9f01ada2767216b46792c4616261843aca6a562a638fb75556 2914353 update-manager_0.142.23.1.tar.gz
Files:
881c94cff640b3aa75c7a9ffa7288d23 1858 gnome optional update-manager_0.142.23.1.dsc
da07aa491b92180d202c1fb95cc41a2c 2914353 gnome optional update-manager_0.142.23.1.tar.gz
More information about the Maverick-changes
mailing list