[ubuntu/jaunty] lcms 1.17.dfsg-1ubuntu2 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Fri Mar 27 14:35:12 GMT 2009
lcms (1.17.dfsg-1ubuntu2) jaunty; urgency=low
* SECURITY UPDATE: Denial of service via large memory leak
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: properly
free memory in src/cmsio1.c.
- CVE-2009-0581
* SECURITY UPDATE: Arbitrary code execution due to integer overflows
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: add new
calloc function in include/lcms.h and fix overflows in src/cmsgamma.c,
src/cmsio0.c, src/cmsio1.c and src/cmslut.c.
- CVE-2009-0723
* SECURITY UPDATE: Arbitrary code execution due to buffer overflow
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: add
_cmsValidateLUT() and use in src/cmsio1.c and src/cmslut.c.
- CVE-2009-0733
Date: Fri, 20 Mar 2009 15:04:07 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Jamie Strandboge <jamie at ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/lcms/1.17.dfsg-1ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Fri, 20 Mar 2009 15:04:07 -0400
Source: lcms
Binary: liblcms1 liblcms-utils liblcms1-dev python-liblcms
Architecture: source
Version: 1.17.dfsg-1ubuntu2
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
liblcms-utils - Color management library (Additional utilities)
liblcms1 - Color management library
liblcms1-dev - Color management library (Development headers)
python-liblcms - Python bindings for liblcms color management library
Changes:
lcms (1.17.dfsg-1ubuntu2) jaunty; urgency=low
.
* SECURITY UPDATE: Denial of service via large memory leak
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: properly
free memory in src/cmsio1.c.
- CVE-2009-0581
* SECURITY UPDATE: Arbitrary code execution due to integer overflows
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: add new
calloc function in include/lcms.h and fix overflows in src/cmsgamma.c,
src/cmsio0.c, src/cmsio1.c and src/cmslut.c.
- CVE-2009-0723
* SECURITY UPDATE: Arbitrary code execution due to buffer overflow
- debian/patches/11_security_CVE-2009-0581_0723_0733.dpatch: add
_cmsValidateLUT() and use in src/cmsio1.c and src/cmslut.c.
- CVE-2009-0733
Checksums-Sha1:
a457443126a49cc0b2f4e3f67c854eac7d6885b9 1383 lcms_1.17.dfsg-1ubuntu2.dsc
2db4269baa9a6f3a4fb837417ccaa192bdba5f0a 12019 lcms_1.17.dfsg-1ubuntu2.diff.gz
Checksums-Sha256:
8d2ed1881d2b74760b145785f4dab7e16118b5f3d9cc7ca58dd8a3e28c06ec04 1383 lcms_1.17.dfsg-1ubuntu2.dsc
39c540275f3b21beec7075e738ecc2b35a43d970b937ebf29c2824535930e048 12019 lcms_1.17.dfsg-1ubuntu2.diff.gz
Files:
d7ca7b546a62292479f8fe1c2936dde2 1383 libs optional lcms_1.17.dfsg-1ubuntu2.dsc
90996467ebb7c2c16b8ff42e1da32492 12019 libs optional lcms_1.17.dfsg-1ubuntu2.diff.gz
Original-Maintainer: Oleksandr Moskalenko <malex at debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAknM4poACgkQW0JvuRdL8BpCZACeLkctd96jxODY+120KKUZOiPB
UBkAoJJQJkLdEGMhZiU1lB7IlLQtnBWC
=ilFZ
-----END PGP SIGNATURE-----
More information about the Jaunty-changes
mailing list