[ubuntu/saucy-proposed] libxi 2:1.6.99.1-0ubuntu4 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Wed Jun 5 19:45:41 UTC 2013
libxi (2:1.6.99.1-0ubuntu4) saucy; urgency=low
* SECURITY UPDATE: denial of service and possible code execution via
incorrect memory size calculations
- debian/patches/CVE-2013-1984.patch: fix multiple integer overflows.
- CVE-2013-1984
* SECURITY UPDATE: denial of service and possible code execution via
incorrect memory size calculations from signedness issues
- debian/patches/CVE-2013-1995.patch: fix signedness issues in
src/XListDev.c.
- CVE-2013-1995
* SECURITY UPDATE: denial of service and possible code execution via
incorrect length and bounds checking
- debian/patches/CVE-2013-1998.patch: properly check lengths and
indexes in src/XGetBMap.c, src/XIPassiveGrab.c, src/XQueryDv.c.
- CVE-2013-1998
Date: Wed, 05 Jun 2013 15:41:47 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu X-SWAT <ubuntu-x at lists.ubuntu.com>
https://launchpad.net/ubuntu/saucy/+source/libxi/2:1.6.99.1-0ubuntu4
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 05 Jun 2013 15:41:47 -0400
Source: libxi
Binary: libxi6 libxi6-udeb libxi6-dbg libxi-dev
Architecture: source
Version: 2:1.6.99.1-0ubuntu4
Distribution: saucy
Urgency: low
Maintainer: Ubuntu X-SWAT <ubuntu-x at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libxi-dev - X11 Input extension library (development headers)
libxi6 - X11 Input extension library
libxi6-dbg - X11 Input extension library (debug package)
libxi6-udeb - X11 Input extension library (udeb)
Changes:
libxi (2:1.6.99.1-0ubuntu4) saucy; urgency=low
.
* SECURITY UPDATE: denial of service and possible code execution via
incorrect memory size calculations
- debian/patches/CVE-2013-1984.patch: fix multiple integer overflows.
- CVE-2013-1984
* SECURITY UPDATE: denial of service and possible code execution via
incorrect memory size calculations from signedness issues
- debian/patches/CVE-2013-1995.patch: fix signedness issues in
src/XListDev.c.
- CVE-2013-1995
* SECURITY UPDATE: denial of service and possible code execution via
incorrect length and bounds checking
- debian/patches/CVE-2013-1998.patch: properly check lengths and
indexes in src/XGetBMap.c, src/XIPassiveGrab.c, src/XQueryDv.c.
- CVE-2013-1998
Checksums-Sha1:
d090309e1bcca26dff3bdcac096c89240fa63650 2369 libxi_1.6.99.1-0ubuntu4.dsc
5023720c511a6cd715d6eae20d2dddcc8ac15fad 29943 libxi_1.6.99.1-0ubuntu4.diff.gz
Checksums-Sha256:
4f1160ae1a603880b7a7a682c066486b8edf25e10d613db08e3fd3d4375b241a 2369 libxi_1.6.99.1-0ubuntu4.dsc
03e84fe2bd4d06e326502f0e6c7d4349fd7e116d202180d3584929441b4d51b4 29943 libxi_1.6.99.1-0ubuntu4.diff.gz
Files:
60c90eeac9738a973af3d5ac675738d3 2369 x11 optional libxi_1.6.99.1-0ubuntu4.dsc
e0d6fa0b001e9a99c45532aa9afbbad5 29943 x11 optional libxi_1.6.99.1-0ubuntu4.diff.gz
Original-Maintainer: Debian X Strike Force <debian-x at lists.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=ZL6F
-----END PGP SIGNATURE-----
More information about the Saucy-changes
mailing list