Back to ia32-libs PTS page

Accepted ia32-libs 20150413 (source amd64) into squeeze-lts



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 13 Apr 2015 11:39:57 +0200
Source: ia32-libs
Binary: ia32-libs ia32-libs-dev
Architecture: source amd64
Version: 20150413
Distribution: squeeze-lts
Urgency: low
Maintainer: Debian ia32-libs Team <pkg-ia32-libs-maintainers@lists.alioth.debian.org>
Changed-By: Thijs Kinkhorst <thijs@debian.org>
Description: 
 ia32-libs  - ia32 shared libraries for use on amd64 and ia64 systems
 ia32-libs-dev - ia32 development files for use on amd64 and ia64 systems
Changes: 
 ia32-libs (20150413) squeeze-lts; urgency=low
 .
   * Packages updated
 .
   [ cups (1.4.4-7+squeeze7) squeeze-lts; urgency=medium ]
 .
   * Backport upstream patches to fix:
     - Buffer overflow in cupsRasterReadPixels (STR #4551), fixes CVE-2014-2679
 .
   [ e2fsprogs (1.41.12-4+deb6u2) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Debian LTS team.
   * Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
     (#778948)
 .
   [ e2fsprogs (1.41.12-4+deb6u1) squeeze-lts; urgency=low ]
 .
   * Non-maintainer upload by the Debian LTS team.
   * libext2fs: Fix buffer overflow if s_first_meta_bg is too big
     as reported in CVE-2015-0247.
     Refer to upstream commit:
     https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
 .
   [ freetype (2.4.2-2.1+squeeze5) squeeze-lts; urgency=medium ]
 .
   * Non-maintainer upload by the Squeeze LTS team
   * Fix recent applicable CVEs (#777656):
     - [sfnt] Fix Savannah bug #43680. CVE-2014-9656
     - [truetype] Fix Savannah bug #43679. CVE-2014-9657
     - [sfnt] Fix Savannah bug #43672. CVE-2014-9658
     - [bdf] Fix Savannah bug #43660. CVE-2014-9660
     - [type42] Allow only embedded TrueType fonts. CVE-2014-9661
     - [sfnt] Fix Savannah bug #43656. CVE-2014-9663
     - [type1, type42] Fix Savannah bug #43655. CVE-2014-9664
     - Change some fields in `FT_Bitmap' to unsigned type. CVE-2014-9665
     - Make `FT_Bitmap_Convert' correctly handle negative `pitch' values.
       CVE-2014-9665-fixup
     - Fix uninitialized variable warning. CVE-2014-9665-fixup-2
     - [sfnt] Fix Savannah bug #43591. CVE-2014-9666
     - [sfnt] Fix Savannah bug #43590. CVE-2014-9667
     - [sfnt] Fix Savannah bug #43588. CVE-2014-9669
     - Fix Savannah bug #43548. CVE-2014-9670
     - Fix Savannah bug #43547. CVE-2014-9671
     - Fix Savannah bug #43540. CVE-2014-9672
     - Fix Savannah bug #43539. CVE-2014-9673
     - src/base/ftobjs.c (Mac_Read_POST_Resource): Avoid memory leak by
       a broken POST table in resource-fork. CVE-2014-9673-fixup
     - Fix Savannah bug #43538. CVE-2014-9674-part-1
     - src/base/ftobj.c (Mac_Read_POST_Resource): Additional overflow check
       in the summation of POST fragment lengths. CVE-2014-9674-part-2
     - src/base/ftobjs.c (Mac_Read_POST_Resource): Use unsigned long variables
       to read the lengths in POST fragments. CVE-2014-9674-fixup-1
     - src/base/ftobjs.c (Mac_Read_POST_Resource): Insert comments and fold
       too long tracing messages. CVS-2014-9674-fixup-2
     - Fix Savannah bug #43535. CVE-2014-9675
     - [bdf] Fix Savannah bug #41692. CVE-2014-9675-fixup-1
 .
   [ gnutls26 (2.8.6-1+squeeze5) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Debian LTS Team.
   * Includes multiple security fixes:
     - CVE-2014-8155: missing date/time checks on CA certificates
     - CVE-2015-0282: GnuTLS does not verify the RSA PKCS #1 signature
       algorithm to match the signature algorithm in the certificate, leading to
       a potential downgrade to a disallowed algorithm without detecting it.
       (Backported patch prepared by the Red Hat security team.)
     - CVE-2015-0294: GnuTLS does not check whether the two signature
       algorithms match on certificate import.
 .
   [ krb5 (1.8.3+dfsg-4squeeze9) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * MITKRB5-SA-2015-001
     - CVE-2014-5352: gss_process_context_token() incorrectly frees context
     - CVE-2014-9421: kadmind doubly frees partial deserialization results
     - CVE-2014-9422: kadmind incorrectly validates server principal name
     - CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
 .
   [ libgcrypt11 (1.4.5-2+squeeze3) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * Use ciphertext blinding for Elgamal decryption to counteract a
     side-channel attack as per CVE-2014-3591
   * Fix data-dependent timing variations in the modular exponentiation
     function that could be used to mount a side-channel attack as per
     CVE-2015-0837
 .
   [ libssh2 (1.2.6-1+deb6u1) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * Add CVE-2015-1782.patch.
     CVE-2015-1782: Using SSH_MSG_KEXINIT data unbounded.
 .
   [ libtasn1-3 (2.7-1+squeeze+3) squeeze-lts; urgency=low ]
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * Add CVE-2015-2806.patch patch.
     CVE-2015-2806: stack overflow in asn1_der_decoding.
 .
   [ libxml2 (2.7.8.dfsg-2+squeeze11) squeeze-lts; urgency=high ]
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * Do not fetch external parsed entities unless asked to do so. This
     supplements the patch for CVE-2014-0191
   * Fix regression introducedd by the patch fixing CVE-2014-3660
     (#768089)
 .
   [ nss (3.12.8-1+squeeze11) squeeze-lts; urgency=medium ]
 .
   * Non-maintainer upload by the Debian LTS team.
   * Fix CVE-2011-3389 by backporting the upstream patch:
     https://hg.mozilla.org/projects/nss/rev/7f7446fcc7ab
   * Fix CVE-2014-1569 by backporting the upstream patch:
     https://hg.mozilla.org/projects/nss/rev/a163e09dc4d5
     #773625
 .
   [ openssl (0.9.8o-4squeeze20) squeeze-lts; urgency=medium ]
 .
   * Fix CVE-2015-0286
   * Fix CVE-2015-0287
   * Fix CVE-2015-0289
   * Fix CVE-2015-0292
   * Fix CVE-2015-0293
   * Fix CVE-2015-0209
   * Fix CVE-2015-0288
   * Remove export ciphers from DEFAULT.
Checksums-Sha1: 
 234eac96a263d006320aed3ea7dc5ee0f4adb303 1548 ia32-libs_20150413.dsc
 80e1652cbd99f0fbdb27e7bfdc6b22b08a0b1bcb 334822997 ia32-libs_20150413.tar.gz
 d37437d49a04052138d649c133294dd7389fc441 34262700 ia32-libs_20150413_amd64.deb
 a65c417d6771969033163f1d1178ba48973d969c 13098308 ia32-libs-dev_20150413_amd64.deb
Checksums-Sha256: 
 370f02b51bdf21d5ed7011bd86addd29f10b27f997ba2ff1bf7d0698055f5033 1548 ia32-libs_20150413.dsc
 89b677cb6cd58d61dceb2247f3627be602cb1e059c77bd7a4cab9994bc682d44 334822997 ia32-libs_20150413.tar.gz
 4bce46ec7e370368bbd27956406abfb1d04a1ce1419231db2d7c563a79184a9e 34262700 ia32-libs_20150413_amd64.deb
 a9a7fb60ddaf8704e8ddd1b9c1bdcdab33e9764702bf06ecf537560b70efd7bf 13098308 ia32-libs-dev_20150413_amd64.deb
Files: 
 be37e03570fbc2a8d23e25bd7e4852dc 1548 libs optional ia32-libs_20150413.dsc
 c46bdc47dc469164effab1a64395ed51 334822997 libs optional ia32-libs_20150413.tar.gz
 349911af5b26fcb93a57ed476929eca6 34262700 libs optional ia32-libs_20150413_amd64.deb
 7f6a832479816a47808618be8d2cbe71 13098308 libdevel extra ia32-libs-dev_20150413_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJVK++7AAoJEFb2GnlAHawEyIMIAK3cpx/2c2DHhCTbOK4CnI47
Jw5Yqzmjp0Gu/rtrxhPDDjHnfA91tZZA2lFBwdHc3Okv73nVKoFU6Z0/8v3OaJ1z
7K8ChVzX3phGoG0Y2FcPgIx+rCsBtsezwgmyK2QkZdajZhQldMlH7KEtXrJI0xy7
+0iteFgumzTCoT/hMEXzlTJK7UcS5fRhtzhmEukEJ5LDXzxPYOmGcupckR4c1+vK
lXN/w05scr16Rj6iTAsRqOVfD8hI51hV/fTdK03CkoJGmLXYZ/oOY8jYtwFz819h
syHcxPV7EIFr7oUL4zeSU3+fL849CQaIQqHagO0GaeaZZ09ZF7h8ytcOzoixe08=
=i9VZ
-----END PGP SIGNATURE-----