Back to ia32-libs PTS page

Accepted ia32-libs 20130924 (source amd64)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 24 Sep 2013 08:15:54 +0200
Source: ia32-libs
Binary: ia32-libs ia32-libs-dev
Architecture: source amd64
Version: 20130924
Distribution: squeeze-proposed-updates
Urgency: low
Maintainer: Debian ia32-libs Team <pkg-ia32-libs-maintainers@lists.alioth.debian.org>
Changed-By: Thijs Kinkhorst <thijs@debian.org>
Description: 
 ia32-libs  - ia32 shared libraries for use on amd64 and ia64 systems
 ia32-libs-dev - ia32 development files for use on amd64 and ia64 systems
Changes: 
 ia32-libs (20130924) squeeze-proposed-updates; urgency=low
 .
   * Packages updated
 .
   [ cups (1.4.4-7+squeeze3) stable; urgency=low ]
 .
   [ Didier Raboud ]
   * Ship cups-files.conf's manpage in cups (#697543)
     - Update the configuration files split patch to also build the
       manpage;
     - Install the english manpage.
   * Generate translated cups-files.conf's manpage in the po4a
     infrastructure.
   * Minimally update French manpage translation
 .
   [ Helge Kreutzmann ]
   * Update German manpage translation. (#697860)
 .
   [ curl (7.21.0-2.1+squeeze4) oldstable-security; urgency=high ]
 .
   * Fix URL decode buffer boundary flaw as per CVE-2013-2174
     http://curl.haxx.se/docs/adv_20130622.html
   * Set urgency=high accordingly
 .
   [ curl (7.21.0-2.1+squeeze3) squeeze-security; urgency=high ]
 .
   * Non-maintainer upload
 .
   [ Alessandro Ghedini ]
   * Fix cookie domain tailmatch as per CVE-2013-1944
     http://curl.haxx.se/docs/adv_20130412.html
   * Set urgency=high accordingly
 .
   [ Salvatore Bonaccorso ]
   * Add testcase for CVE-2013-1944
 .
   [ dbus (1.2.24-4+squeeze2) stable; urgency=low ]
 .
   * CVE-2012-3524: apply patches from upstream 1.6.6 to avoid arbitrary
     code execution in setuid/setgid binaries that incorrectly use libdbus
     without first sanitizing the environment variables inherited from
     their less-privileged caller (#689070).
     - As per upstream 1.6.8, do not check filesystem capabilities for now,
       only setuid/setgid, fixing regressions in certain configurations of
       gnome-keyring
 .
   [ krb5 (1.8.3+dfsg-4squeeze7) oldstable-security; urgency=medium ]
 .
   * Fix "cve-2002-2443: kpasswd udp ping-pong"  (#708267)
 .
   [ libgcrypt11 (1.4.5-2+squeeze1) squeeze-security; urgency=high ]
 .
   * Pull and unfuzzz code changes from 1.5.3 security fix release from
     upstream GIT:
     + [35_bug-in-mpi_powm-for-e-0.patch] mpi/mpi-pow.c (gcry_mpi_powm) - For
       a zero exponent, make sure that the result has been allocated.
     + [36_Mitigate-flush-reload-cache-attack-on-RSA.patch] Mitigate a
       flush+reload cache attack on RSA secret exponents.
       <http://eprint.iacr.org/2013/448>
     This fixes CVE-2013-4242.
 .
   [ libx11 (2:1.3.3-4+squeeze1) squeeze-security; urgency=high ]
 .
   * CVE-2013-1981: integer overflows calculating memory needs for replies
   * CVE-2013-1997: buffer overflows due to not validating length or offset
     values in replies
   * CVE-2013-2004: unbounded recursion parsing user-specified files
     (#145048)
 .
   [ libxcb (1.6-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-2064
 .
   [ libxcursor (1:1.1.10-2+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-2003
 .
   [ libxext (2:1.1.2-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1982
 .
   [ libxfixes (1:4.0.5-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1983
 .
   [ libxi (2:1.3-8) oldstable-security; urgency=low ]
 .
   * CVE-2013-1984 CVE-2013-1995 CVE-2013-1998
 .
   [ libxinerama (2:1.1-3+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1985
 .
   [ libxml2 (2.7.8.dfsg-2+squeeze7) stable-security; urgency=high ]
 .
   * Non-maintainer upload by the Security Team.
   * Fix cve-2013-0338 and cve-2013-0339: large memory consuption issues when
     performing string substition during entity expansion (#702260).
 .
   [ libxp (1:1.0.0.xsf1-2+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-2062
 .
   [ libxrandr (2:1.3.0-3+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1986
 .
   [ libxrender (1:0.9.6-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1987
 .
   [ libxslt (1.1.26-6+squeeze3) stable-security; urgency=high ]
 .
   * Non-maintainer upload by the Security Team.
   * Add patches to fix denial of service vulnerability (CVE-2012-6139)
     (#703933)
 .
   [ libxt (1:1.0.7-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-2002 CVE-2013-2005
 .
   [ libxtst (2:1.1.0-3+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-2063
 .
   [ libxv (2:1.0.5-1+squeeze1) oldstable-security; urgency=low ]
 .
   * CVE-2013-1989 CVE-2013-2066
 .
   [ libxxf86vm (1:1.1.0-2+squeeze1) squeeze-security; urgency=high ]
 .
   * When Xcalloc() returns NULL, you don't need to Xfree() it
   * Improve error handling in XF86VidModeGetMonitor()
   * Unlock display before returning alloc error in XF86VidModeGetModeLine(),
     XF86VidModeGetAllModeLines(), XF86VidModeGetDotClocks()
   * memory corruption in XF86VidModeGetGammaRamp() [CVE-2013-2001]
   * avoid integer overflow in XF86VidModeGetModeLine
 .
   [ mesa (7.7.1-6) oldstable-security; urgency=low ]
 .
   * CVE-2013-1993
 .
   [ openldap (2.4.23-7.3) stable; urgency=low ]
 .
   * Non-maintainer upload targeted at stable
   * Dump the database in prerm if we're upgrading. #665199
 .
   [ tiff (3.9.4-5+squeeze10) oldstable-security; urgency=high ]
 .
   * Incorporated fixes to security issues CVE-2013-4231, CVE-2013-4232.
     (#719303)
   * Incorporated fix to CVE-2013-4244.
 .
   [ tiff (3.9.4-5+squeeze9) oldstable-security; urgency=high ]
 .
   * Non-maintainer upload by the Security Team.
   * Fix cve-2013-1960: heap-based buffer overlow in tiff2pdf
     (#706675).
   * Fix cve-2013-1961: stack-based buffer overflow in tiff2pdf
     (#706674).
Checksums-Sha1: 
 886d0bd0720af72ad12a63466c4d70673cc07e31 1641 ia32-libs_20130924.dsc
 4b5bd055234d68994483493ba93df7daf97a4eb6 334660727 ia32-libs_20130924.tar.gz
 913dc32bedbf69bd70b32977b1990a4cc53878a2 34265574 ia32-libs_20130924_amd64.deb
 ff372c6f64cf1beb19bdc982beeffdd0808c8658 13081516 ia32-libs-dev_20130924_amd64.deb
Checksums-Sha256: 
 724b404294b205f1650f70e9dfe389e3ad7dfc7d6070de304114e31f1ca95955 1641 ia32-libs_20130924.dsc
 9c5db3c9f7be55c1c347cc1770ae6ce4847ad0a25de95d7d12f159f0eb9746b0 334660727 ia32-libs_20130924.tar.gz
 cdd12c66cfdee91a960eeba7a448b78a76fb396f8469c362cd59ce9e51fdda14 34265574 ia32-libs_20130924_amd64.deb
 56fedcea17f9b1611415caf92d24e37c70ff4ff03ad1e76d7fa130aba6eef53c 13081516 ia32-libs-dev_20130924_amd64.deb
Files: 
 70b17a21b59f368cb2f0b59dfddbe4fd 1641 libs optional ia32-libs_20130924.dsc
 0e4fc51f818b641fc16a663a4f67712d 334660727 libs optional ia32-libs_20130924.tar.gz
 7595b9a67c61f587e4112c8abc05ee1f 34265574 libs optional ia32-libs_20130924_amd64.deb
 2de7e5ce6323e91155575979ffb27235 13081516 libdevel extra ia32-libs-dev_20130924_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBAgAGBQJSQTRIAAoJEFb2GnlAHawEvnUIAJY2aQ3QgO4bfoXsz96rLBmE
VZVeEntMzOYYFAfNGzB+xcnUgimI6NeGsu3vZ0HCOoFJpaSHrkcpcxvW6WN3omWh
McQkAMf5pFiUEhHyDNmu3mTZ68m86xWakMMtEqgPrJzbzkSKJNa+1/awKjbRW90e
/aAeih9DgSxqXsrLd5Cu4g0ZOu6++fXCBMdZTjD5Mx5Z79G+VAOT/523cf3sdyBm
lRPu9NN7+hiv3Dozi3YBm+Kkr4tuLHahAvnH6zF2GcV+StpFXRLPOxW4GzTQ+nt7
n9aGCh/rjSYEyPDNf9q+sC6OCU4HAiSzBjPcejOjSYqEmWhEwWbZrL77ujBi6UE=
=/qhp
-----END PGP SIGNATURE-----