Public bug reported: The auto-updater was asking for permission to update Bash. The "Changes" message was as follows: Changes for bash versions: Installed version: 4.3-7ubuntu1.3 Available version: 4.3-7ubuntu1.4
Version 4.3-7ubuntu1.4: * SECURITY UPDATE: out-of-bounds memory access - debian/patches/CVE-2014-718x.diff: guard against overflow and fix off-by-one in parse.y and y.tab.c. - CVE-2014-7186 - CVE-2014-7187 * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports - debian/patches/variables-affix.diff: add prefixes and suffixes in variables.c. Each CVE link went to an URL such as http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-7186. This is an error page which states that the CVE_ID is invalid. I would have expected to see a bug description of some sort. Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. I assume this is for the reason suggested, that the problem has not been uploaded, and that this is now the correct URL. Does the code that generates the links need to include "CVE-" in the URLs? I assume that this will apply to all updates, not just Bash, but I can't yet verify this. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: update-manager 1:0.196.12 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Aptdaemon: Architecture: amd64 CurrentDesktop: Unity Date: Sat Sep 27 10:40:34 2014 ExecutablePath: /usr/bin/update-manager GsettingsChanges: b'com.ubuntu.update-manager' b'show-details' b'true' b'com.ubuntu.update-manager' b'window-height' b'1000' b'com.ubuntu.update-manager' b'first-run' b'false' b'com.ubuntu.update-manager' b'window-width' b'1215' b'com.ubuntu.update-manager' b'launch-time' b'1411810242' InstallationDate: Installed on 2014-07-31 (57 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) InterpreterPath: /usr/bin/python3.4 PackageArchitecture: all SourcePackage: update-manager UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: update-manager (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty ** Description changed: The auto-updater was asking for permission to update Bash. The "Changes" message was as follows: Changes for bash versions: Installed version: 4.3-7ubuntu1.3 Available version: 4.3-7ubuntu1.4 Version 4.3-7ubuntu1.4: - * SECURITY UPDATE: out-of-bounds memory access - - debian/patches/CVE-2014-718x.diff: guard against overflow and fix - off-by-one in parse.y and y.tab.c. - - CVE-2014-7186 - - CVE-2014-7187 - * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports - - debian/patches/variables-affix.diff: add prefixes and suffixes in - variables.c. + * SECURITY UPDATE: out-of-bounds memory access + - debian/patches/CVE-2014-718x.diff: guard against overflow and fix + off-by-one in parse.y and y.tab.c. + - CVE-2014-7186 + - CVE-2014-7187 + * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports + - debian/patches/variables-affix.diff: add prefixes and suffixes in + variables.c. Each CVE link went to an URL such as http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-7186. This is an error page which states that the CVE_ID is invalid. I would have expected to see a bug description of some sort. - Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. (I assume this is for the reason suggested, that the problem has not been uploaded). + Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. I assume this is for the reason suggested, that the problem has not been uploaded, and that this is now the correct URL. + Does the code that generates the links need to include "CVE-" in the URLs? I assume that this will apply to all updates, not just Bash, but I can't yet verify this. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: update-manager 1:0.196.12 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Aptdaemon: - + Architecture: amd64 CurrentDesktop: Unity Date: Sat Sep 27 10:40:34 2014 ExecutablePath: /usr/bin/update-manager GsettingsChanges: - b'com.ubuntu.update-manager' b'show-details' b'true' - b'com.ubuntu.update-manager' b'window-height' b'1000' - b'com.ubuntu.update-manager' b'first-run' b'false' - b'com.ubuntu.update-manager' b'window-width' b'1215' - b'com.ubuntu.update-manager' b'launch-time' b'1411810242' + b'com.ubuntu.update-manager' b'show-details' b'true' + b'com.ubuntu.update-manager' b'window-height' b'1000' + b'com.ubuntu.update-manager' b'first-run' b'false' + b'com.ubuntu.update-manager' b'window-width' b'1215' + b'com.ubuntu.update-manager' b'launch-time' b'1411810242' InstallationDate: Installed on 2014-07-31 (57 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) InterpreterPath: /usr/bin/python3.4 PackageArchitecture: all SourcePackage: update-manager UpgradeStatus: No upgrade log present (probably fresh install) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374715 Title: CVE links in the updater are invalid To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1374715/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs