[ubuntu/saucy-proposed] libxi 2:1.6.99.1-0ubuntu4 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Wed Jun 5 19:45:41 UTC 2013


libxi (2:1.6.99.1-0ubuntu4) saucy; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1984.patch: fix multiple integer overflows.
    - CVE-2013-1984
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations from signedness issues
    - debian/patches/CVE-2013-1995.patch: fix signedness issues in
      src/XListDev.c.
    - CVE-2013-1995
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1998.patch: properly check lengths and
      indexes in src/XGetBMap.c, src/XIPassiveGrab.c, src/XQueryDv.c.
    - CVE-2013-1998

Date: Wed, 05 Jun 2013 15:41:47 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu X-SWAT <ubuntu-x at lists.ubuntu.com>
https://launchpad.net/ubuntu/saucy/+source/libxi/2:1.6.99.1-0ubuntu4
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 05 Jun 2013 15:41:47 -0400
Source: libxi
Binary: libxi6 libxi6-udeb libxi6-dbg libxi-dev
Architecture: source
Version: 2:1.6.99.1-0ubuntu4
Distribution: saucy
Urgency: low
Maintainer: Ubuntu X-SWAT <ubuntu-x at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 libxi-dev  - X11 Input extension library (development headers)
 libxi6     - X11 Input extension library
 libxi6-dbg - X11 Input extension library (debug package)
 libxi6-udeb - X11 Input extension library (udeb)
Changes: 
 libxi (2:1.6.99.1-0ubuntu4) saucy; urgency=low
 .
   * SECURITY UPDATE: denial of service and possible code execution via
     incorrect memory size calculations
     - debian/patches/CVE-2013-1984.patch: fix multiple integer overflows.
     - CVE-2013-1984
   * SECURITY UPDATE: denial of service and possible code execution via
     incorrect memory size calculations from signedness issues
     - debian/patches/CVE-2013-1995.patch: fix signedness issues in
       src/XListDev.c.
     - CVE-2013-1995
   * SECURITY UPDATE: denial of service and possible code execution via
     incorrect length and bounds checking
     - debian/patches/CVE-2013-1998.patch: properly check lengths and
       indexes in src/XGetBMap.c, src/XIPassiveGrab.c, src/XQueryDv.c.
     - CVE-2013-1998
Checksums-Sha1: 
 d090309e1bcca26dff3bdcac096c89240fa63650 2369 libxi_1.6.99.1-0ubuntu4.dsc
 5023720c511a6cd715d6eae20d2dddcc8ac15fad 29943 libxi_1.6.99.1-0ubuntu4.diff.gz
Checksums-Sha256: 
 4f1160ae1a603880b7a7a682c066486b8edf25e10d613db08e3fd3d4375b241a 2369 libxi_1.6.99.1-0ubuntu4.dsc
 03e84fe2bd4d06e326502f0e6c7d4349fd7e116d202180d3584929441b4d51b4 29943 libxi_1.6.99.1-0ubuntu4.diff.gz
Files: 
 60c90eeac9738a973af3d5ac675738d3 2369 x11 optional libxi_1.6.99.1-0ubuntu4.dsc
 e0d6fa0b001e9a99c45532aa9afbbad5 29943 x11 optional libxi_1.6.99.1-0ubuntu4.diff.gz
Original-Maintainer: Debian X Strike Force <debian-x at lists.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=ZL6F
-----END PGP SIGNATURE-----


More information about the Saucy-changes mailing list