-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 25 May 2003 18:28:06 -0400
Source: gps
Binary: gps rgpsp
Architecture: sparc
Version: 0.9.4-1woody1
Distribution: stable-security
Urgency: high
Maintainer: Debian/SPARC Build Daemon <buildd@vore.debian.org>
Changed-By: Matt Zimmerman <mdz@debian.org>
Description: 
 gps        - Graphical PS using GTK
 rgpsp      - Remote gPS poller
Changes: 
 gps (0.9.4-1woody1) stable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team
   * Backport security fixes from upstream 1.1.0:
     - bug fix on rgpsp connection source acceptation policy
       (it was allowing any host to connect even when the
        /etc/rgpsp.conf file told otherwise)
       It is working now, but on any real ("production")
       network I suggest you use IP filtering to enforce
       the policy (like ipchains or iptables)
     - Several possibilities of buffer overflows have been
       fixed. Thanks to Stanislav Ievlev from ALT-Linux for
       pointing a lot of them.
     - fixed misformatting of command line parameters in
       rgpsp protocol (command lines with newlines would
       break the protocol)
     - fixed buffer overflow bug that caused rgpsp
       to SIGSEGV when stating processes with large
       command lines (>128 chars) [Linux only]
Files: 
 3f02b0b6de5f1452bffaab8e948d72c4 109792 admin optional gps_0.9.4-1woody1_sparc.deb
 3d78e02308f4fe57e7f053aeb96033f2 24096 admin optional rgpsp_0.9.4-1woody1_sparc.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+0ZagArxCt0PiXR4RAgnrAJ9XvY7Kp+emX9vPaYvLq7GWWlFLswCfSoen
tr/M0QKNcUVhzCcRy2anzpY=
=3TYl
-----END PGP SIGNATURE-----