exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 38193

Secunia Security Advisory 38193
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for network-manager-applet. This fixes some security issues, which can be exploited by malicious, local users to gain knowledge of sensitive information and by malicious people to bypass certain security restrictions.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | 9f66100dc6bf146f0f0bfbf75170d4e811892855999b761c05c44e1fbe73f7ca

Secunia Security Advisory 38193

Change Mirror Download
----------------------------------------------------------------------



Accurate Vulnerability Scanning
No more false positives, no more false negatives

http://secunia.com/vulnerability_scanning/



----------------------------------------------------------------------

TITLE:
Ubuntu update for network-manager-applet

SECUNIA ADVISORY ID:
SA38193

VERIFY ADVISORY:
http://secunia.com/advisories/38193/

DESCRIPTION:
Ubuntu has issued an update for network-manager-applet. This fixes
some security issues, which can be exploited by malicious, local
users to gain knowledge of sensitive information and by malicious
people to bypass certain security restrictions.

For more information:
SA37647
SA37819

SOLUTION:
Apply updated packages.

-- Ubuntu 8.10 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7~~svn20081020t000444-0ubuntu1.8.10.3.diff.gz
Size/MD5: 52472 b82ebcb1945e432b7141c51500cf54d0
http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7~~svn20081020t000444-0ubuntu1.8.10.3.dsc
Size/MD5: 1745 682f49446d481b1c47a9191a7e8863d0
http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7~~svn20081020t000444.orig.tar.gz
Size/MD5: 668729 af829714605058afb3cf77c5d419ae83

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-gnome_0.7~~svn20081020t000444-0ubuntu1.8.10.3_amd64.deb
Size/MD5: 314590 93926fe52218799bb9582a9937625ebc

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-gnome_0.7~~svn20081020t000444-0ubuntu1.8.10.3_i386.deb
Size/MD5: 300692 e8130472fa267cd98d5696a660f7121b

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7~~svn20081020t000444-0ubuntu1.8.10.3_lpia.deb
Size/MD5: 299180 9b9c2a8e5577ede2474873c864dfb620

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7~~svn20081020t000444-0ubuntu1.8.10.3_powerpc.deb
Size/MD5: 310850 051260d8bf82146f1533e10ec842db46

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7~~svn20081020t000444-0ubuntu1.8.10.3_sparc.deb
Size/MD5: 303226 0fcfffc3b7948a93d8c20a22a867b34e

-- Ubuntu 9.04 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7.1~rc4.1-0ubuntu2.1.diff.gz
Size/MD5: 39587 f761e8d9cbe68d5ff1a1ef1f373d0855
http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7.1~rc4.1-0ubuntu2.1.dsc
Size/MD5: 1621 83c06ab153587c3d3ece6ec8d27e8fa6
http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-applet_0.7.1~rc4.1.orig.tar.gz
Size/MD5: 812190 85177fb4f930e731187ad1f811f07888

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-gnome_0.7.1~rc4.1-0ubuntu2.1_amd64.deb
Size/MD5: 381524 c8a4ece54773441228662a1d8f0b78c0

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/network-manager-applet/network-manager-gnome_0.7.1~rc4.1-0ubuntu2.1_i386.deb
Size/MD5: 365622 13d6469d61d2323a6813e2ef763eccb2

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7.1~rc4.1-0ubuntu2.1_lpia.deb
Size/MD5: 362318 17f179f208b66b13320543e806f7aaed

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7.1~rc4.1-0ubuntu2.1_powerpc.deb
Size/MD5: 375036 32034d9e9af5d92a8a8174a2684f1ce2

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/n/network-manager-applet/network-manager-gnome_0.7.1~rc4.1-0ubuntu2.1_sparc.deb
Size/MD5: 368592 95d9b33243243701ecf97145d473043e

ORIGINAL ADVISORY:
USN-883-1:
http://www.ubuntu.com/usn/USN-883-1

OTHER REFERENCES:
SA37647:
http://secunia.com/advisories/37647/

SA37819:
http://secunia.com/advisories/37819/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close