-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Tue, 24 Sep 2013 08:15:54 +0200 Source: ia32-libs Binary: ia32-libs ia32-libs-dev Architecture: source amd64 Version: 20130924 Distribution: squeeze-proposed-updates Urgency: low Maintainer: Debian ia32-libs Team <pkg-ia32-libs-maintainers@lists.alioth.debian.org> Changed-By: Thijs Kinkhorst <thijs@debian.org> Description: ia32-libs - ia32 shared libraries for use on amd64 and ia64 systems ia32-libs-dev - ia32 development files for use on amd64 and ia64 systems Changes: ia32-libs (20130924) squeeze-proposed-updates; urgency=low . * Packages updated . [ cups (1.4.4-7+squeeze3) stable; urgency=low ] . [ Didier Raboud ] * Ship cups-files.conf's manpage in cups (#697543) - Update the configuration files split patch to also build the manpage; - Install the english manpage. * Generate translated cups-files.conf's manpage in the po4a infrastructure. * Minimally update French manpage translation . [ Helge Kreutzmann ] * Update German manpage translation. (#697860) . [ curl (7.21.0-2.1+squeeze4) oldstable-security; urgency=high ] . * Fix URL decode buffer boundary flaw as per CVE-2013-2174 http://curl.haxx.se/docs/adv_20130622.html * Set urgency=high accordingly . [ curl (7.21.0-2.1+squeeze3) squeeze-security; urgency=high ] . * Non-maintainer upload . [ Alessandro Ghedini ] * Fix cookie domain tailmatch as per CVE-2013-1944 http://curl.haxx.se/docs/adv_20130412.html * Set urgency=high accordingly . [ Salvatore Bonaccorso ] * Add testcase for CVE-2013-1944 . [ dbus (1.2.24-4+squeeze2) stable; urgency=low ] . * CVE-2012-3524: apply patches from upstream 1.6.6 to avoid arbitrary code execution in setuid/setgid binaries that incorrectly use libdbus without first sanitizing the environment variables inherited from their less-privileged caller (#689070). - As per upstream 1.6.8, do not check filesystem capabilities for now, only setuid/setgid, fixing regressions in certain configurations of gnome-keyring . [ krb5 (1.8.3+dfsg-4squeeze7) oldstable-security; urgency=medium ] . * Fix "cve-2002-2443: kpasswd udp ping-pong" (#708267) . [ libgcrypt11 (1.4.5-2+squeeze1) squeeze-security; urgency=high ] . * Pull and unfuzzz code changes from 1.5.3 security fix release from upstream GIT: + [35_bug-in-mpi_powm-for-e-0.patch] mpi/mpi-pow.c (gcry_mpi_powm) - For a zero exponent, make sure that the result has been allocated. + [36_Mitigate-flush-reload-cache-attack-on-RSA.patch] Mitigate a flush+reload cache attack on RSA secret exponents. <http://eprint.iacr.org/2013/448> This fixes CVE-2013-4242. . [ libx11 (2:1.3.3-4+squeeze1) squeeze-security; urgency=high ] . * CVE-2013-1981: integer overflows calculating memory needs for replies * CVE-2013-1997: buffer overflows due to not validating length or offset values in replies * CVE-2013-2004: unbounded recursion parsing user-specified files (#145048) . [ libxcb (1.6-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-2064 . [ libxcursor (1:1.1.10-2+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-2003 . [ libxext (2:1.1.2-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1982 . [ libxfixes (1:4.0.5-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1983 . [ libxi (2:1.3-8) oldstable-security; urgency=low ] . * CVE-2013-1984 CVE-2013-1995 CVE-2013-1998 . [ libxinerama (2:1.1-3+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1985 . [ libxml2 (2.7.8.dfsg-2+squeeze7) stable-security; urgency=high ] . * Non-maintainer upload by the Security Team. * Fix cve-2013-0338 and cve-2013-0339: large memory consuption issues when performing string substition during entity expansion (#702260). . [ libxp (1:1.0.0.xsf1-2+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-2062 . [ libxrandr (2:1.3.0-3+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1986 . [ libxrender (1:0.9.6-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1987 . [ libxslt (1.1.26-6+squeeze3) stable-security; urgency=high ] . * Non-maintainer upload by the Security Team. * Add patches to fix denial of service vulnerability (CVE-2012-6139) (#703933) . [ libxt (1:1.0.7-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-2002 CVE-2013-2005 . [ libxtst (2:1.1.0-3+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-2063 . [ libxv (2:1.0.5-1+squeeze1) oldstable-security; urgency=low ] . * CVE-2013-1989 CVE-2013-2066 . [ libxxf86vm (1:1.1.0-2+squeeze1) squeeze-security; urgency=high ] . * When Xcalloc() returns NULL, you don't need to Xfree() it * Improve error handling in XF86VidModeGetMonitor() * Unlock display before returning alloc error in XF86VidModeGetModeLine(), XF86VidModeGetAllModeLines(), XF86VidModeGetDotClocks() * memory corruption in XF86VidModeGetGammaRamp() [CVE-2013-2001] * avoid integer overflow in XF86VidModeGetModeLine . [ mesa (7.7.1-6) oldstable-security; urgency=low ] . * CVE-2013-1993 . [ openldap (2.4.23-7.3) stable; urgency=low ] . * Non-maintainer upload targeted at stable * Dump the database in prerm if we're upgrading. #665199 . [ tiff (3.9.4-5+squeeze10) oldstable-security; urgency=high ] . * Incorporated fixes to security issues CVE-2013-4231, CVE-2013-4232. (#719303) * Incorporated fix to CVE-2013-4244. . [ tiff (3.9.4-5+squeeze9) oldstable-security; urgency=high ] . * Non-maintainer upload by the Security Team. * Fix cve-2013-1960: heap-based buffer overlow in tiff2pdf (#706675). * Fix cve-2013-1961: stack-based buffer overflow in tiff2pdf (#706674). Checksums-Sha1: 886d0bd0720af72ad12a63466c4d70673cc07e31 1641 ia32-libs_20130924.dsc 4b5bd055234d68994483493ba93df7daf97a4eb6 334660727 ia32-libs_20130924.tar.gz 913dc32bedbf69bd70b32977b1990a4cc53878a2 34265574 ia32-libs_20130924_amd64.deb ff372c6f64cf1beb19bdc982beeffdd0808c8658 13081516 ia32-libs-dev_20130924_amd64.deb Checksums-Sha256: 724b404294b205f1650f70e9dfe389e3ad7dfc7d6070de304114e31f1ca95955 1641 ia32-libs_20130924.dsc 9c5db3c9f7be55c1c347cc1770ae6ce4847ad0a25de95d7d12f159f0eb9746b0 334660727 ia32-libs_20130924.tar.gz cdd12c66cfdee91a960eeba7a448b78a76fb396f8469c362cd59ce9e51fdda14 34265574 ia32-libs_20130924_amd64.deb 56fedcea17f9b1611415caf92d24e37c70ff4ff03ad1e76d7fa130aba6eef53c 13081516 ia32-libs-dev_20130924_amd64.deb Files: 70b17a21b59f368cb2f0b59dfddbe4fd 1641 libs optional ia32-libs_20130924.dsc 0e4fc51f818b641fc16a663a4f67712d 334660727 libs optional ia32-libs_20130924.tar.gz 7595b9a67c61f587e4112c8abc05ee1f 34265574 libs optional ia32-libs_20130924_amd64.deb 2de7e5ce6323e91155575979ffb27235 13081516 libdevel extra ia32-libs-dev_20130924_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQEcBAEBAgAGBQJSQTRIAAoJEFb2GnlAHawEvnUIAJY2aQ3QgO4bfoXsz96rLBmE VZVeEntMzOYYFAfNGzB+xcnUgimI6NeGsu3vZ0HCOoFJpaSHrkcpcxvW6WN3omWh McQkAMf5pFiUEhHyDNmu3mTZ68m86xWakMMtEqgPrJzbzkSKJNa+1/awKjbRW90e /aAeih9DgSxqXsrLd5Cu4g0ZOu6++fXCBMdZTjD5Mx5Z79G+VAOT/523cf3sdyBm lRPu9NN7+hiv3Dozi3YBm+Kkr4tuLHahAvnH6zF2GcV+StpFXRLPOxW4GzTQ+nt7 n9aGCh/rjSYEyPDNf9q+sC6OCU4HAiSzBjPcejOjSYqEmWhEwWbZrL77ujBi6UE= =/qhp -----END PGP SIGNATURE-----