it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5682-2] glib2.0 regression update
- Date: Thu, 09 May 2024 05:01:07 +0000
- List-archive: https://lists.debian.org/msgid-search/E1s4vtz-007U0J-VB AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=WI8djqhhFhkW9xNqI53Lva6w+K5pUrYPupHqNut4PG4=; b=kO i23K6TSY0aaHSE2gF+BsPpbjNkldmxaafXmhLEzpx8SIioDrINvQF1RynpDzg+K6gcV84RGbEBL1y 7FskKnmG7boiICyRtYgiCclYntVNxIezZoWXXolGtHx5VesWxoSrp3fgW/sJ+LUnxcegIKXcy+deR 7axXOkKRVtoZ7E4Tdt5BG8CCFVw07KSdl7GS9t9jxI2eELJuIvXM8NWVftUs82wl3AiV7qCu/d8LK 69yZiz9Q+KdSjV9O5tJeKtN0exj7Fhv45uQXp+qUBWBX7bLRiOhJTJuL9/TdVpCHZHBHyvtDiJKwp Il5yEeTpeBJ3LJsVAXtRIa13YWkgDu1g==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 9 May 2024 05:02:00 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <7Gio-dtgy3K.A.sGB.IjFPmB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5682-2 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 09, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : glib2.0
Debian Bug : 1070730 1070736 1070743 1070745 1070749 1070752
The update for glib2.0 released as DSA 5682-1 caused a regression in
ibus affecting text entry with non-trivial input methods. Updated
glib2.0 packages are available to correct this issue.
For the oldstable distribution (bullseye), this problem has been fixed
in version 2.66.8-1+deb11u3.
For the stable distribution (bookworm), this problem has been fixed in
version 2.74.6-2+deb12u2.
We recommend that you upgrade your glib2.0 packages.
For the detailed security status of glib2.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/glib2.0
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmY8V7JfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RJGA/+IOsDXWcvXMOYEueKNZ+pIFVXLbT4GVMBvUIBf0wqJFbnmwaTXaEojqNR
HKFcCLIBKzhHkJvCmhaEsaZXj05GxI0jIKV0CULuEl1PeYpXaypIF0BIbtH7Jd0j
Q7/3qQgafewuJgqwn7e3CG9mF8oZv/QfwH4VPaJMkMd7cdRNytKOiJosg2ZEl3FK
ycO/t58SMPxApzY5eebAU/u37UKAzI7PeCIz9FaCUQdwMUFuUeJvsYD21PwxYN/R
LK79UsnHiw6sr3cpNirOhm7F3HXSh7WFBqQdcLGrTaix3X+RKW7NymNhIW8m7qWg
kJ7w6JArMuvxj2Y2RiBF0eqVVkYcTHOe964+nvDHjzFIUkLU0yhw2GLhK4GzbWjl
VpXc/+Rv1I9OsFF4SiKNSbi728NM4GUS3ziew//1l9EPM281UrCDoFRkwi1FP2jT
KVWB0CZacqLmo62cT49HBb1rSxDXSEi0qc0yMKus+Jk+NT8H1k+cpjrK5hy0flJt
JJWTOJMJ2Ph7LvLbrfsVoeuxeIz+taoLz6JW5dkpk1/LkxSmZkIKztdolirONMqF
vBCTyz7IvBxqro5+vRsBnSFPJdw4pCVxhfgI/BFIUe8dA2Sh8bE+o69wTgcGDst5
ZHf28D3hClhMSc/SgotNTUf8KycA15VjxhvNtAeFL0HpOvAKiKI=
=T+EA
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5682-2] glib2.0 regression update, Salvatore Bonaccorso, 09.05.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.