========================================= 
Thu,  20 Nov 2003 - Debian 3.0r2 released
=========================================

Removed the following packages from stable:

       aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
   aspell-doc | 0.33.7.1-8 | all
    aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
  libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The license incorrectly says that it's LGPL but it is in fact
    a unique license which is non-DFSG-free."

--

             cyrus-sasl2 |    2.1.2-2 | source
                libsasl2 |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
            libsasl2-dev |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
libsasl2-digestmd5-plain |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
  libsasl2-modules-plain |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
               sasl2-bin |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The library has some minor security problems and according to
    the maintainer some other problems as well, i.e. it could not
    work with software in testing/unstable which requires it
    either.  All of the SASL-using software in stable uses
    cyrus-sasl, not cyrus-sasl2."

--

      micq | 0.4.9-0woody2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The library has some minor security problems and according to
    Any version: Serious copyright violation, hence, removing.
    It's been removed from unstable and testing already. See
    Bug#167606 and Bug#194784"

--

     mindi |  0.58.r5-1 | alpha, arm, hppa, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "mindi is i386-centric since it uses lilo.  It was only
    accidently set to arch=any"

--

rocks-n-diamonds |  2.0.0-0.2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, s390, sparc
rocks-n-diamonds | 2.0.0-0.2.1 | powerpc

 (Reason: as requested by Stable Release Manager)
   "Rocks-N-Diamonds contains sound, graphics and level data which
    violate section 2.3 of the Debian policy manual.  Some of the
    game content originates with commercial sources that have not
    provided explicit permission for their reuse."
      

--

python-tmda |     0.51-1 | all
       tmda |     0.51-1 | source, all

 (Reason: as requested by Stable Release Manager)
   "Bug#219361: please remove tmda from stable"

--

zblast-svgalib |   1.2pre-5 | alpha

 (Reason: as requested by Stable Release Manager)
   "The alpha build failed completely because svgalib doesn't
    exist on alpha anymore in woody (i.e., its build-depends could
    not even be met), so I had to disable it.  Hence, the alpha
    package needs to be removed."

------

	
stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.4_sparc.deb
stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.4_sparc.deb
stable/main/binary-sparc/openssl_0.9.6c-2.woody.4_sparc.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.4_s390.deb
stable/main/binary-s390/openssl_0.9.6c-2.woody.4_s390.deb
stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.4_s390.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.4_powerpc.deb
stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.4_powerpc.deb
stable/main/binary-powerpc/openssl_0.9.6c-2.woody.4_powerpc.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-mipsel/openssl_0.9.6c-2.woody.4_mipsel.deb
stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.4_mipsel.deb
stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.4_mipsel.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.4_mips.deb
stable/main/binary-mips/openssl_0.9.6c-2.woody.4_mips.deb
stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.4_mips.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.4_m68k.deb
stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.4_m68k.deb
stable/main/binary-m68k/openssl_0.9.6c-2.woody.4_m68k.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-ia64/openssl_0.9.6c-2.woody.4_ia64.deb
stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.4_ia64.deb
stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.4_ia64.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.4_hppa.deb
stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.4_hppa.deb
stable/main/binary-hppa/openssl_0.9.6c-2.woody.4_hppa.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.4_arm.deb
stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.4_arm.deb
stable/main/binary-arm/openssl_0.9.6c-2.woody.4_arm.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-alpha/openssl_0.9.6c-2.woody.4_alpha.deb
stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.4_alpha.deb
stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.4_alpha.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/source/openssl_0.9.6c-2.woody.4.dsc
stable/main/binary-i386/openssl_0.9.6c-2.woody.4_i386.deb
stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.4_i386.deb
stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.4_i386.deb
stable/main/binary-all/ssleay_0.9.6c-2.woody.4_all.deb
stable/main/source/openssl_0.9.6c-2.woody.4.diff.gz
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543

	
stable/main/binary-sparc/nhfsstone_1.0-2woody1_sparc.deb
stable/main/binary-sparc/nfs-kernel-server_1.0-2woody1_sparc.deb
stable/main/binary-sparc/nfs-common_1.0-2woody1_sparc.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-s390/nhfsstone_1.0-2woody1_s390.deb
stable/main/binary-s390/nfs-kernel-server_1.0-2woody1_s390.deb
stable/main/binary-s390/nfs-common_1.0-2woody1_s390.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody1_powerpc.deb
stable/main/binary-powerpc/nhfsstone_1.0-2woody1_powerpc.deb
stable/main/binary-powerpc/nfs-common_1.0-2woody1_powerpc.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody1_mipsel.deb
stable/main/binary-mipsel/nhfsstone_1.0-2woody1_mipsel.deb
stable/main/binary-mipsel/nfs-common_1.0-2woody1_mipsel.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-mips/nfs-kernel-server_1.0-2woody1_mips.deb
stable/main/binary-mips/nhfsstone_1.0-2woody1_mips.deb
stable/main/binary-mips/nfs-common_1.0-2woody1_mips.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-m68k/nfs-kernel-server_1.0-2woody1_m68k.deb
stable/main/binary-m68k/nfs-common_1.0-2woody1_m68k.deb
stable/main/binary-m68k/nhfsstone_1.0-2woody1_m68k.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-ia64/nfs-kernel-server_1.0-2woody1_ia64.deb
stable/main/binary-ia64/nhfsstone_1.0-2woody1_ia64.deb
stable/main/binary-ia64/nfs-common_1.0-2woody1_ia64.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-hppa/nhfsstone_1.0-2woody1_hppa.deb
stable/main/binary-hppa/nfs-kernel-server_1.0-2woody1_hppa.deb
stable/main/binary-hppa/nfs-common_1.0-2woody1_hppa.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-arm/nfs-common_1.0-2woody1_arm.deb
stable/main/binary-arm/nhfsstone_1.0-2woody1_arm.deb
stable/main/binary-arm/nfs-kernel-server_1.0-2woody1_arm.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-alpha/nfs-common_1.0-2woody1_alpha.deb
stable/main/binary-alpha/nfs-kernel-server_1.0-2woody1_alpha.deb
stable/main/binary-alpha/nhfsstone_1.0-2woody1_alpha.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/source/nfs-utils_1.0-2woody1.tar.gz
stable/main/binary-i386/nfs-common_1.0-2woody1_i386.deb
stable/main/binary-i386/nhfsstone_1.0-2woody1_i386.deb
stable/main/binary-i386/nfs-kernel-server_1.0-2woody1_i386.deb
stable/main/source/nfs-utils_1.0-2woody1.dsc
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-sparc/zlib1g_1.1.4-1.0woody0_sparc.deb
stable/main/binary-sparc/zlib-bin_1.1.4-1.0woody0_sparc.deb
stable/main/binary-sparc/zlib1g-dev_1.1.4-1.0woody0_sparc.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-s390/zlib-bin_1.1.4-1.0woody0_s390.deb
stable/main/binary-s390/zlib1g-dev_1.1.4-1.0woody0_s390.deb
stable/main/binary-s390/zlib1g_1.1.4-1.0woody0_s390.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-powerpc/zlib1g_1.1.4-1.0woody0_powerpc.deb
stable/main/binary-powerpc/zlib1g-dev_1.1.4-1.0woody0_powerpc.deb
stable/main/binary-powerpc/zlib-bin_1.1.4-1.0woody0_powerpc.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-mipsel/zlib-bin_1.1.4-1.0woody0_mipsel.deb
stable/main/binary-mipsel/zlib1g-dev_1.1.4-1.0woody0_mipsel.deb
stable/main/binary-mipsel/zlib1g_1.1.4-1.0woody0_mipsel.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-mips/zlib1g-dev_1.1.4-1.0woody0_mips.deb
stable/main/binary-mips/zlib-bin_1.1.4-1.0woody0_mips.deb
stable/main/binary-mips/zlib1g_1.1.4-1.0woody0_mips.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-m68k/zlib1g-dev_1.1.4-1.0woody0_m68k.deb
stable/main/binary-m68k/zlib1g_1.1.4-1.0woody0_m68k.deb
stable/main/binary-m68k/zlib-bin_1.1.4-1.0woody0_m68k.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-ia64/zlib1g_1.1.4-1.0woody0_ia64.deb
stable/main/binary-ia64/zlib1g-dev_1.1.4-1.0woody0_ia64.deb
stable/main/binary-ia64/zlib-bin_1.1.4-1.0woody0_ia64.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-hppa/zlib-bin_1.1.4-1.0woody0_hppa.deb
stable/main/binary-hppa/zlib1g-dev_1.1.4-1.0woody0_hppa.deb
stable/main/binary-hppa/zlib1g_1.1.4-1.0woody0_hppa.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-arm/zlib-bin_1.1.4-1.0woody0_arm.deb
stable/main/binary-arm/zlib1g-dev_1.1.4-1.0woody0_arm.deb
stable/main/binary-arm/zlib1g_1.1.4-1.0woody0_arm.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-alpha/zlib1g-dev_1.1.4-1.0woody0_alpha.deb
stable/main/binary-alpha/zlib1g_1.1.4-1.0woody0_alpha.deb
stable/main/binary-alpha/zlib-bin_1.1.4-1.0woody0_alpha.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-i386/zlib-bin_1.1.4-1.0woody0_i386.deb
stable/main/binary-i386/zlib1-altdev_1.1.4-1.0woody0_i386.deb
stable/main/binary-i386/zlib1g_1.1.4-1.0woody0_i386.deb
stable/main/source/zlib_1.1.4-1.0woody0.diff.gz
stable/main/binary-i386/zlib1_1.1.4-1.0woody0_i386.deb
stable/main/source/zlib_1.1.4-1.0woody0.dsc
stable/main/binary-i386/zlib1g-dev_1.1.4-1.0woody0_i386.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-sparc/zblast-x11_1.2pre-5woody2_sparc.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-s390/zblast-x11_1.2pre-5woody2_s390.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-powerpc/zblast-x11_1.2pre-5woody2_powerpc.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-mipsel/zblast-x11_1.2pre-5woody2_mipsel.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-mips/zblast-x11_1.2pre-5woody2_mips.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-m68k/zblast-x11_1.2pre-5woody2_m68k.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-ia64/zblast-x11_1.2pre-5woody2_ia64.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-hppa/zblast-x11_1.2pre-5woody2_hppa.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-arm/zblast-x11_1.2pre-5woody2_arm.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-alpha/zblast-x11_1.2pre-5woody2_alpha.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-i386/zblast-svgalib_1.2pre-5woody2_i386.deb
stable/main/binary-all/zblast-data_1.2pre-5woody2_all.deb
stable/main/source/zblast_1.2pre-5woody2.diff.gz
stable/main/source/zblast_1.2pre-5woody2.dsc
stable/main/binary-i386/zblast-x11_1.2pre-5woody2_i386.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-sparc/xtokkaetama_1.0b-6woody2_sparc.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-s390/xtokkaetama_1.0b-6woody2_s390.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-powerpc/xtokkaetama_1.0b-6woody2_powerpc.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-mipsel/xtokkaetama_1.0b-6woody2_mipsel.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-mips/xtokkaetama_1.0b-6woody2_mips.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-m68k/xtokkaetama_1.0b-6woody2_m68k.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-ia64/xtokkaetama_1.0b-6woody2_ia64.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-hppa/xtokkaetama_1.0b-6woody2_hppa.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-arm/xtokkaetama_1.0b-6woody2_arm.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-alpha/xtokkaetama_1.0b-6woody2_alpha.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/source/xtokkaetama_1.0b-6woody2.dsc
stable/main/source/xtokkaetama_1.0b-6woody2.diff.gz
stable/main/binary-i386/xtokkaetama_1.0b-6woody2_i386.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-s390/xpdf-reader_1.00-3.1_s390.deb
stable/main/binary-s390/xpdf-utils_1.00-3.1_s390.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-powerpc/xpdf-utils_1.00-3.1_powerpc.deb
stable/main/binary-powerpc/xpdf-reader_1.00-3.1_powerpc.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-mipsel/xpdf-utils_1.00-3.1_mipsel.deb
stable/main/binary-mipsel/xpdf-reader_1.00-3.1_mipsel.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-mips/xpdf-reader_1.00-3.1_mips.deb
stable/main/binary-mips/xpdf-utils_1.00-3.1_mips.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-m68k/xpdf-utils_1.00-3.1_m68k.deb
stable/main/binary-m68k/xpdf-reader_1.00-3.1_m68k.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-ia64/xpdf-utils_1.00-3.1_ia64.deb
stable/main/binary-ia64/xpdf-reader_1.00-3.1_ia64.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-i386/xpdf-utils_1.00-3.1_i386.deb
stable/main/binary-i386/xpdf-reader_1.00-3.1_i386.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-hppa/xpdf-reader_1.00-3.1_hppa.deb
stable/main/binary-hppa/xpdf-utils_1.00-3.1_hppa.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-arm/xpdf-reader_1.00-3.1_arm.deb
stable/main/binary-arm/xpdf-utils_1.00-3.1_arm.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-alpha/xpdf-reader_1.00-3.1_alpha.deb
stable/main/binary-alpha/xpdf-utils_1.00-3.1_alpha.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-sparc/xpdf-utils_1.00-3.1_sparc.deb
stable/main/binary-sparc/xpdf-reader_1.00-3.1_sparc.deb
stable/main/source/xpdf_1.00-3.1.diff.gz
stable/main/binary-all/xpdf-common_1.00-3.1_all.deb
stable/main/source/xpdf_1.00-3.1.dsc
stable/main/binary-all/xpdf_1.00-3.1_all.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-sparc/xnc_4.4.7-3.woody.1_sparc.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-s390/xnc_4.4.7-3.woody.1_s390.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-powerpc/xnc_4.4.7-3.woody.1_powerpc.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-mipsel/xnc_4.4.7-3.woody.1_mipsel.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-mips/xnc_4.4.7-3.woody.1_mips.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-m68k/xnc_4.4.7-3.woody.1_m68k.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-ia64/xnc_4.4.7-3.woody.1_ia64.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-hppa/xnc_4.4.7-3.woody.1_hppa.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-arm/xnc_4.4.7-3.woody.1_arm.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-alpha/xnc_4.4.7-3.woody.1_alpha.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/source/xnc_4.4.7-3.woody.1.diff.gz
stable/main/binary-i386/xnc_4.4.7-3.woody.1_i386.deb
stable/main/source/xnc_4.4.7-3.woody.1.dsc
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-sparc/xgalaga_2.0.34-19woody1_sparc.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-s390/xgalaga_2.0.34-19woody1_s390.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-powerpc/xgalaga_2.0.34-19woody1_powerpc.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-mipsel/xgalaga_2.0.34-19woody1_mipsel.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-mips/xgalaga_2.0.34-19woody1_mips.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-m68k/xgalaga_2.0.34-19woody1_m68k.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-ia64/xgalaga_2.0.34-19woody1_ia64.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-hppa/xgalaga_2.0.34-19woody1_hppa.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-arm/xgalaga_2.0.34-19woody1_arm.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-alpha/xgalaga_2.0.34-19woody1_alpha.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/source/xgalaga_2.0.34-19woody1.diff.gz
stable/main/binary-i386/xgalaga_2.0.34-19woody1_i386.deb
stable/main/source/xgalaga_2.0.34-19woody1.dsc
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-sparc/xfstt_1.2.1-3_sparc.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-s390/xfstt_1.2.1-3_s390.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-powerpc/xfstt_1.2.1-3_powerpc.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-mipsel/xfstt_1.2.1-3_mipsel.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-mips/xfstt_1.2.1-3_mips.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-m68k/xfstt_1.2.1-3_m68k.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-ia64/xfstt_1.2.1-3_ia64.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-hppa/xfstt_1.2.1-3_hppa.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-arm/xfstt_1.2.1-3_arm.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-alpha/xfstt_1.2.1-3_alpha.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/source/xfstt_1.2.1-3.tar.gz
stable/main/source/xfstt_1.2.1-3.dsc
stable/main/binary-i386/xfstt_1.2.1-3_i386.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-s390/xfsdump_2.0.1-2_s390.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-powerpc/xfsdump_2.0.1-2_powerpc.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-mipsel/xfsdump_2.0.1-2_mipsel.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-mips/xfsdump_2.0.1-2_mips.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-m68k/xfsdump_2.0.1-2_m68k.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-ia64/xfsdump_2.0.1-2_ia64.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-i386/xfsdump_2.0.1-2_i386.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-hppa/xfsdump_2.0.1-2_hppa.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-arm/xfsdump_2.0.1-2_arm.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-alpha/xfsdump_2.0.1-2_alpha.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/source/xfsdump_2.0.1-2.dsc
stable/main/source/xfsdump_2.0.1-2.tar.gz
stable/main/binary-sparc/xfsdump_2.0.1-2_sparc.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-sparc/xterm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xutils_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xprt_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/proxymngr_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps1_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa3_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xnest_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/lbxproxy_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xdm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xbase-clients_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-pic_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/x-window-system-core_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xfs_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xmh_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xfwp_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xserver-common_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xvfb_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/twm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs_4.1.0-16woody1_sparc.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-s390/xterm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa3_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xvfb_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xbase-clients_4.1.0-16woody1_s390.deb
stable/main/binary-s390/proxymngr_4.1.0-16woody1_s390.deb
stable/main/binary-s390/lbxproxy_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps1_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xdm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xfwp_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xmh_4.1.0-16woody1_s390.deb
stable/main/binary-s390/x-window-system-core_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xnest_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xprt_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xutils_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xserver-common_4.1.0-16woody1_s390.deb
stable/main/binary-s390/twm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-pic_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps1-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xfs_4.1.0-16woody1_s390.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xserver-common_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/lbxproxy_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps1_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xterm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xdm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/proxymngr_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xvfb_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/twm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xfs_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xutils_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xbase-clients_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xprt_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xfwp_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xnest_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xmh_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody1_mipsel.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-mips/libxaw6-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xutils_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa3_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xserver-xfree86_4.1.0-16woody1_mips.deb
stable/main/binary-mips/x-window-system-core_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xvfb_4.1.0-16woody1_mips.deb
stable/main/binary-mips/twm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps1_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xterm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xdm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xmh_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xserver-common_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xbase-clients_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw6_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xnest_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xfs_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xfwp_4.1.0-16woody1_mips.deb
stable/main/binary-mips/proxymngr_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-pic_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps1-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xprt_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/lbxproxy_4.1.0-16woody1_mips.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xdm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xbase-clients_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps1_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/x-window-system-core_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xterm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/proxymngr_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa3_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xfs_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/lbxproxy_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xvfb_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xmh_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xfwp_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw6_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-pic_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xserver-common_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xprt_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xutils_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/twm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xnest_4.1.0-16woody1_m68k.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa3_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps1_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/x-window-system-core_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xvfb_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xprt_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/lbxproxy_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xdm_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xbase-clients_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw6_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xfwp_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xmh_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xserver-common_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xterm_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xfs_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xnest_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xutils_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-pic_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/proxymngr_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/twm_4.1.0-16woody1_ia64.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-i386/lbxproxy_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa3_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xutils_4.1.0-16woody1_i386.deb
stable/main/binary-i386/proxymngr_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xnest_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xbase-clients_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps1_4.1.0-16woody1_i386.deb
stable/main/binary-i386/x-window-system-core_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xvfb_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xterm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xprt_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xmh_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xfwp_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xfs_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xserver-common_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps1-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xserver-xfree86_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-pic_4.1.0-16woody1_i386.deb
stable/main/binary-i386/twm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xdm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa3_4.1.0-16woody1_i386.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-hppa/libxaw6_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xfwp_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xmh_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/twm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xdm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xprt_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xutils_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xserver-common_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xfs_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xnest_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xterm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xvfb_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa3_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps1_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/lbxproxy_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/x-window-system-core_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xbase-clients_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/proxymngr_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-pic_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody1_hppa.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-arm/xlibs-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/proxymngr_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xnest_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xbase-clients_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xserver-xfree86_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs-pic_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa3_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps1-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xserver-common_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xdm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/x-window-system-core_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/lbxproxy_4.1.0-16woody1_arm.deb
stable/main/binary-arm/twm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xmh_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xprt_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xvfb_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xterm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xfs_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xutils_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps1_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xfwp_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6_4.1.0-16woody1_arm.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xvfb_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa3_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xserver-common_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xutils_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps1_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/twm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/proxymngr_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xmh_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-pic_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xterm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xnest_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xprt_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xdm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/x-window-system-core_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xbase-clients_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/lbxproxy_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xfwp_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xfs_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody1_alpha.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-all/xfonts-scalable_4.1.0-16woody1_all.deb
stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody1_all.deb
stable/main/source/xfree86_4.1.0-16woody1.diff.gz
stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xmh_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xfs_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xvfb_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/twm_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libdps1_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-pex_4.1.0-16woody1_all.deb
stable/main/binary-all/xfree86-common_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xbase-clients_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-75dpi_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xprt_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xlib6g-dev_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/libdps-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xfwp_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-base_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xnest_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/x-window-system_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xutils_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xserver-common_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xdm_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xlib6g_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/proxymngr_4.1.0-16woody1_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody1.dsc
stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/lbxproxy_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-100dpi_4.1.0-16woody1_all.deb
stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xterm_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xspecs_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw6_4.1.0-16woody1_powerpc.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-sparc/xbl_1.0k-3woody2_sparc.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-s390/xbl_1.0k-3woody2_s390.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-powerpc/xbl_1.0k-3woody2_powerpc.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-mipsel/xbl_1.0k-3woody2_mipsel.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-mips/xbl_1.0k-3woody2_mips.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-m68k/xbl_1.0k-3woody2_m68k.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-ia64/xbl_1.0k-3woody2_ia64.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-hppa/xbl_1.0k-3woody2_hppa.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-arm/xbl_1.0k-3woody2_arm.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-alpha/xbl_1.0k-3woody2_alpha.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/source/xbl_1.0k-3woody2.dsc
stable/main/source/xbl_1.0k-3woody2.diff.gz
stable/main/binary-i386/xbl_1.0k-3woody2_i386.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/source/x-face-el_1.3.6.19-1woody1.dsc
stable/main/source/x-face-el_1.3.6.19-1woody1.diff.gz
stable/main/binary-all/x-face-el_1.3.6.19-1woody1_all.deb
x-face-el (1.3.6.19-1woody1) stable-security; urgency=high
  * Fix insecure tempfile handling. (backport from 1.3.6.23)


stable/main/binary-sparc/wu-ftpd_2.6.2-3woody2_sparc.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-s390/wu-ftpd_2.6.2-3woody2_s390.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody2_powerpc.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody2_mipsel.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-mips/wu-ftpd_2.6.2-3woody2_mips.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-m68k/wu-ftpd_2.6.2-3woody2_m68k.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-ia64/wu-ftpd_2.6.2-3woody2_ia64.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-hppa/wu-ftpd_2.6.2-3woody2_hppa.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-arm/wu-ftpd_2.6.2-3woody2_arm.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-alpha/wu-ftpd_2.6.2-3woody2_alpha.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/source/wu-ftpd_2.6.2-3woody2.diff.gz
stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody2_all.deb
stable/main/source/wu-ftpd_2.6.2-3woody2.dsc
stable/main/binary-i386/wu-ftpd_2.6.2-3woody2_i386.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.diff.gz
stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.dsc
stable/main/binary-all/wemi_1.14.0.20010802wemiko-1.3woody1_all.deb
wemi (1.14.0.20010802wemiko-1.3woody1) stable; urgency=high
  * Non-maintainer upload by the Stable Release Manager
  * Only bump up the version number so it'll be accepted by katie


stable/main/binary-sparc/webfs_1.17.2_sparc.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-s390/webfs_1.17.2_s390.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-powerpc/webfs_1.17.2_powerpc.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-mipsel/webfs_1.17.2_mipsel.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-mips/webfs_1.17.2_mips.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-m68k/webfs_1.17.2_m68k.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-ia64/webfs_1.17.2_ia64.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-hppa/webfs_1.17.2_hppa.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-arm/webfs_1.17.2_arm.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-alpha/webfs_1.17.2_alpha.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/source/webfs_1.17.2.dsc
stable/main/source/webfs_1.17.2.tar.gz
stable/main/binary-i386/webfs_1.17.2_i386.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-sparc/w3mmee-ssl_0.3.p23.3-1.5_sparc.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3mmee-ssl_0.3.p23.3-1.5_s390.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3mmee-ssl_0.3.p23.3-1.5_mipsel.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3mmee-ssl_0.3.p23.3-1.5_mips.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3mmee-ssl_0.3.p23.3-1.5_m68k.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-ia64/w3mmee-ssl_0.3.p23.3-1.5_ia64.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3mmee-ssl_0.3.p23.3-1.5_i386.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3mmee-ssl_0.3.p23.3-1.5_hppa.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3mmee-ssl_0.3.p23.3-1.5_arm.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3mmee-ssl_0.3.p23.3-1.5_alpha.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3mmee-ssl_0.3.p23.3-1.5_powerpc.deb
stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.dsc
stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.diff.gz
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3mmee_0.3.p23.3-1.5_s390.deb
stable/main/binary-s390/w3mmee-img_0.3.p23.3-1.5_s390.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3mmee_0.3.p23.3-1.5_powerpc.deb
stable/main/binary-powerpc/w3mmee-img_0.3.p23.3-1.5_powerpc.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3mmee_0.3.p23.3-1.5_mipsel.deb
stable/main/binary-mipsel/w3mmee-img_0.3.p23.3-1.5_mipsel.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3mmee_0.3.p23.3-1.5_mips.deb
stable/main/binary-mips/w3mmee-img_0.3.p23.3-1.5_mips.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3mmee-img_0.3.p23.3-1.5_m68k.deb
stable/main/binary-m68k/w3mmee_0.3.p23.3-1.5_m68k.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-ia64/w3mmee_0.3.p23.3-1.5_ia64.deb
stable/main/binary-ia64/w3mmee-img_0.3.p23.3-1.5_ia64.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3mmee-img_0.3.p23.3-1.5_i386.deb
stable/main/binary-i386/w3mmee_0.3.p23.3-1.5_i386.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3mmee_0.3.p23.3-1.5_hppa.deb
stable/main/binary-hppa/w3mmee-img_0.3.p23.3-1.5_hppa.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3mmee-img_0.3.p23.3-1.5_arm.deb
stable/main/binary-arm/w3mmee_0.3.p23.3-1.5_arm.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3mmee-img_0.3.p23.3-1.5_alpha.deb
stable/main/binary-alpha/w3mmee_0.3.p23.3-1.5_alpha.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/w3mmee-img_0.3.p23.3-1.5_sparc.deb
stable/main/binary-sparc/w3mmee_0.3.p23.3-1.5_sparc.deb
stable/main/source/w3mmee_0.3.p23.3-1.5.dsc
stable/main/source/w3mmee_0.3.p23.3-1.5.diff.gz
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3m-ssl_0.3-2.4_s390.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3m-ssl_0.3-2.4_powerpc.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3m-ssl_0.3-2.4_mipsel.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3m-ssl_0.3-2.4_mips.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3m-ssl_0.3-2.4_m68k.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3m-ssl_0.3-2.4_i386.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3m-ssl_0.3-2.4_hppa.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3m-ssl_0.3-2.4_arm.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3m-ssl_0.3-2.4_alpha.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/w3m-ssl_0.3-2.4_sparc.deb
stable/main/source/w3m-ssl_0.3-2.4.diff.gz
stable/main/source/w3m-ssl_0.3-2.4.dsc
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3m-img_0.3-2.4_s390.deb
stable/main/binary-s390/w3m_0.3-2.4_s390.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3m-img_0.3-2.4_powerpc.deb
stable/main/binary-powerpc/w3m_0.3-2.4_powerpc.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3m-img_0.3-2.4_mipsel.deb
stable/main/binary-mipsel/w3m_0.3-2.4_mipsel.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3m-img_0.3-2.4_mips.deb
stable/main/binary-mips/w3m_0.3-2.4_mips.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3m_0.3-2.4_m68k.deb
stable/main/binary-m68k/w3m-img_0.3-2.4_m68k.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3m_0.3-2.4_i386.deb
stable/main/binary-i386/w3m-img_0.3-2.4_i386.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3m-img_0.3-2.4_hppa.deb
stable/main/binary-hppa/w3m_0.3-2.4_hppa.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3m_0.3-2.4_arm.deb
stable/main/binary-arm/w3m-img_0.3-2.4_arm.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3m_0.3-2.4_alpha.deb
stable/main/binary-alpha/w3m-img_0.3-2.4_alpha.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/source/w3m_0.3-2.4.dsc
stable/main/binary-sparc/w3m_0.3-2.4_sparc.deb
stable/main/source/w3m_0.3-2.4.diff.gz
stable/main/binary-sparc/w3m-img_0.3-2.4_sparc.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/util-linux_2.11n-7_sparc.deb
stable/main/binary-sparc/mount_2.11n-7_sparc.deb
stable/main/binary-sparc/bsdutils_2.11n-7_sparc.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-s390/mount_2.11n-7_s390.deb
stable/main/binary-s390/util-linux_2.11n-7_s390.deb
stable/main/binary-s390/bsdutils_2.11n-7_s390.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-powerpc/bsdutils_2.11n-7_powerpc.deb
stable/main/binary-powerpc/util-linux_2.11n-7_powerpc.deb
stable/main/binary-powerpc/mount_2.11n-7_powerpc.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-mipsel/mount_2.11n-7_mipsel.deb
stable/main/binary-mipsel/util-linux_2.11n-7_mipsel.deb
stable/main/binary-mipsel/bsdutils_2.11n-7_mipsel.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-mips/util-linux_2.11n-7_mips.deb
stable/main/binary-mips/bsdutils_2.11n-7_mips.deb
stable/main/binary-mips/mount_2.11n-7_mips.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-m68k/mount_2.11n-7_m68k.deb
stable/main/binary-m68k/util-linux_2.11n-7_m68k.deb
stable/main/binary-m68k/bsdutils_2.11n-7_m68k.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-ia64/bsdutils_2.11n-7_ia64.deb
stable/main/binary-ia64/util-linux_2.11n-7_ia64.deb
stable/main/binary-ia64/mount_2.11n-7_ia64.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-hppa/bsdutils_2.11n-7_hppa.deb
stable/main/binary-hppa/util-linux_2.11n-7_hppa.deb
stable/main/binary-hppa/mount_2.11n-7_hppa.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-arm/mount_2.11n-7_arm.deb
stable/main/binary-arm/bsdutils_2.11n-7_arm.deb
stable/main/binary-arm/util-linux_2.11n-7_arm.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-alpha/mount_2.11n-7_alpha.deb
stable/main/binary-alpha/util-linux_2.11n-7_alpha.deb
stable/main/binary-alpha/bsdutils_2.11n-7_alpha.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-all/util-linux-locales_2.11n-7_all.deb
stable/main/source/util-linux_2.11n-7.dsc
stable/main/binary-i386/util-linux_2.11n-7_i386.deb
stable/main/binary-i386/bsdutils_2.11n-7_i386.deb
stable/main/source/util-linux_2.11n-7.diff.gz
stable/main/binary-i386/mount_2.11n-7_i386.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-sparc/unzip_5.50-1woody2_sparc.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-s390/unzip_5.50-1woody2_s390.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-powerpc/unzip_5.50-1woody2_powerpc.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-mipsel/unzip_5.50-1woody2_mipsel.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-mips/unzip_5.50-1woody2_mips.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-m68k/unzip_5.50-1woody2_m68k.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-ia64/unzip_5.50-1woody2_ia64.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-hppa/unzip_5.50-1woody2_hppa.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-arm/unzip_5.50-1woody2_arm.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-alpha/unzip_5.50-1woody2_alpha.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/source/unzip_5.50-1woody2.dsc
stable/main/source/unzip_5.50-1woody2.diff.gz
stable/main/binary-i386/unzip_5.50-1woody2_i386.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-sparc/typespeed_0.4.1-2.2_sparc.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-s390/typespeed_0.4.1-2.2_s390.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-powerpc/typespeed_0.4.1-2.2_powerpc.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-mipsel/typespeed_0.4.1-2.2_mipsel.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-mips/typespeed_0.4.1-2.2_mips.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-m68k/typespeed_0.4.1-2.2_m68k.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-ia64/typespeed_0.4.1-2.2_ia64.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-hppa/typespeed_0.4.1-2.2_hppa.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-arm/typespeed_0.4.1-2.2_arm.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-alpha/typespeed_0.4.1-2.2_alpha.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/source/typespeed_0.4.1-2.2.dsc
stable/main/source/typespeed_0.4.1-2.2.diff.gz
stable/main/binary-i386/typespeed_0.4.1-2.2_i386.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-sparc/traceroute-nanog_6.1.1-1.3_sparc.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-s390/traceroute-nanog_6.1.1-1.3_s390.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-powerpc/traceroute-nanog_6.1.1-1.3_powerpc.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-mipsel/traceroute-nanog_6.1.1-1.3_mipsel.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-mips/traceroute-nanog_6.1.1-1.3_mips.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-m68k/traceroute-nanog_6.1.1-1.3_m68k.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-ia64/traceroute-nanog_6.1.1-1.3_ia64.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-hppa/traceroute-nanog_6.1.1-1.3_hppa.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-arm/traceroute-nanog_6.1.1-1.3_arm.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-alpha/traceroute-nanog_6.1.1-1.3_alpha.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/source/traceroute-nanog_6.1.1-1.3.diff.gz
stable/main/binary-i386/traceroute-nanog_6.1.1-1.3_i386.deb
stable/main/source/traceroute-nanog_6.1.1-1.3.dsc
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/contrib/source/tomcat4_4.0.3-3woody3.dsc
stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody3_all.deb
stable/contrib/binary-all/tomcat4_4.0.3-3woody3_all.deb
stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody3_all.deb
stable/contrib/source/tomcat4_4.0.3-3woody3.diff.gz
tomcat4 (4.0.3-3woody3) stable-security; urgency=high
  * Include a patch from Aldrin Martoq which fixes a DoS attack
    (closes: #215506)
  * Correctly start tomcat4 when booting (closes: #198226)


stable/contrib/source/tomcat_3.3a-4woody1.diff.gz
stable/contrib/binary-i386/libapache-mod-jk_3.3a-4woody1_i386.deb
stable/contrib/source/tomcat_3.3a-4woody1.dsc
stable/contrib/binary-all/tomcat_3.3a-4woody1_all.deb
tomcat (3.3a-4woody1) unstable; urgency=high
  * Include two security fixes from the Tomcat 3.3.1a release:
    + when used with JDK 1.3.1 or earlier, a maliciously crafted request
      could return a directory listing even when an index.html, index.jsp,
      or other welcome file is present. File contents can be returned as well.
    + a malicious web application could read the contents of some files
      outside the web application via its web.xml file in spite of the
      presence of a security manager
  * Disable the examples webapp since it contains cross site scripting
    vulnerability: examples.war is now installed in
    /usr/share/doc/tomcat/examples


stable/main/binary-s390/thttpd-util_2.21b-11.2_s390.deb
stable/main/binary-s390/thttpd_2.21b-11.2_s390.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-powerpc/thttpd-util_2.21b-11.2_powerpc.deb
stable/main/binary-powerpc/thttpd_2.21b-11.2_powerpc.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-mipsel/thttpd_2.21b-11.2_mipsel.deb
stable/main/binary-mipsel/thttpd-util_2.21b-11.2_mipsel.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-mips/thttpd-util_2.21b-11.2_mips.deb
stable/main/binary-mips/thttpd_2.21b-11.2_mips.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-m68k/thttpd_2.21b-11.2_m68k.deb
stable/main/binary-m68k/thttpd-util_2.21b-11.2_m68k.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-ia64/thttpd-util_2.21b-11.2_ia64.deb
stable/main/binary-ia64/thttpd_2.21b-11.2_ia64.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-i386/thttpd_2.21b-11.2_i386.deb
stable/main/binary-i386/thttpd-util_2.21b-11.2_i386.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-hppa/thttpd-util_2.21b-11.2_hppa.deb
stable/main/binary-hppa/thttpd_2.21b-11.2_hppa.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-arm/thttpd-util_2.21b-11.2_arm.deb
stable/main/binary-arm/thttpd_2.21b-11.2_arm.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-alpha/thttpd-util_2.21b-11.2_alpha.deb
stable/main/binary-alpha/thttpd_2.21b-11.2_alpha.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-sparc/thttpd_2.21b-11.2_sparc.deb
stable/main/source/thttpd_2.21b-11.2.diff.gz
stable/main/source/thttpd_2.21b-11.2.dsc
stable/main/binary-sparc/thttpd-util_2.21b-11.2_sparc.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-sparc/teapop_0.3.4-1woody2_sparc.deb
stable/main/binary-sparc/teapop-mysql_0.3.4-1woody2_sparc.deb
stable/main/binary-sparc/teapop-pgsql_0.3.4-1woody2_sparc.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-s390/teapop-pgsql_0.3.4-1woody2_s390.deb
stable/main/binary-s390/teapop_0.3.4-1woody2_s390.deb
stable/main/binary-s390/teapop-mysql_0.3.4-1woody2_s390.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-powerpc/teapop-pgsql_0.3.4-1woody2_powerpc.deb
stable/main/binary-powerpc/teapop-mysql_0.3.4-1woody2_powerpc.deb
stable/main/binary-powerpc/teapop_0.3.4-1woody2_powerpc.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-mipsel/teapop-pgsql_0.3.4-1woody2_mipsel.deb
stable/main/binary-mipsel/teapop-mysql_0.3.4-1woody2_mipsel.deb
stable/main/binary-mipsel/teapop_0.3.4-1woody2_mipsel.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-mips/teapop-mysql_0.3.4-1woody2_mips.deb
stable/main/binary-mips/teapop_0.3.4-1woody2_mips.deb
stable/main/binary-mips/teapop-pgsql_0.3.4-1woody2_mips.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-m68k/teapop-mysql_0.3.4-1woody2_m68k.deb
stable/main/binary-m68k/teapop_0.3.4-1woody2_m68k.deb
stable/main/binary-m68k/teapop-pgsql_0.3.4-1woody2_m68k.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-ia64/teapop-mysql_0.3.4-1woody2_ia64.deb
stable/main/binary-ia64/teapop-pgsql_0.3.4-1woody2_ia64.deb
stable/main/binary-ia64/teapop_0.3.4-1woody2_ia64.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-hppa/teapop_0.3.4-1woody2_hppa.deb
stable/main/binary-hppa/teapop-pgsql_0.3.4-1woody2_hppa.deb
stable/main/binary-hppa/teapop-mysql_0.3.4-1woody2_hppa.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-arm/teapop_0.3.4-1woody2_arm.deb
stable/main/binary-arm/teapop-mysql_0.3.4-1woody2_arm.deb
stable/main/binary-arm/teapop-pgsql_0.3.4-1woody2_arm.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-alpha/teapop-mysql_0.3.4-1woody2_alpha.deb
stable/main/binary-alpha/teapop-pgsql_0.3.4-1woody2_alpha.deb
stable/main/binary-alpha/teapop_0.3.4-1woody2_alpha.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/source/teapop_0.3.4-1woody2.dsc
stable/main/binary-i386/teapop_0.3.4-1woody2_i386.deb
stable/main/source/teapop_0.3.4-1woody2.diff.gz
stable/main/binary-i386/teapop-mysql_0.3.4-1woody2_i386.deb
stable/main/binary-i386/teapop-pgsql_0.3.4-1woody2_i386.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-sparc/tcptraceroute_1.2-2_sparc.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-s390/tcptraceroute_1.2-2_s390.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-powerpc/tcptraceroute_1.2-2_powerpc.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-mipsel/tcptraceroute_1.2-2_mipsel.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-mips/tcptraceroute_1.2-2_mips.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-m68k/tcptraceroute_1.2-2_m68k.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-ia64/tcptraceroute_1.2-2_ia64.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-hppa/tcptraceroute_1.2-2_hppa.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-arm/tcptraceroute_1.2-2_arm.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-alpha/tcptraceroute_1.2-2_alpha.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/source/tcptraceroute_1.2-2.diff.gz
stable/main/binary-i386/tcptraceroute_1.2-2_i386.deb
stable/main/source/tcptraceroute_1.2-2.dsc
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-s390/tcpdump_3.6.2-2.4_s390.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-powerpc/tcpdump_3.6.2-2.4_powerpc.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-mipsel/tcpdump_3.6.2-2.4_mipsel.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-mips/tcpdump_3.6.2-2.4_mips.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-m68k/tcpdump_3.6.2-2.4_m68k.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-ia64/tcpdump_3.6.2-2.4_ia64.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-i386/tcpdump_3.6.2-2.4_i386.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-hppa/tcpdump_3.6.2-2.4_hppa.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-arm/tcpdump_3.6.2-2.4_arm.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-alpha/tcpdump_3.6.2-2.4_alpha.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/source/tcpdump_3.6.2-2.4.diff.gz
stable/main/binary-sparc/tcpdump_3.6.2-2.4_sparc.deb
stable/main/source/tcpdump_3.6.2-2.4.dsc
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-sparc/sup_1.8-8woody1_sparc.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-s390/sup_1.8-8woody1_s390.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-powerpc/sup_1.8-8woody1_powerpc.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-mipsel/sup_1.8-8woody1_mipsel.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-mips/sup_1.8-8woody1_mips.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-m68k/sup_1.8-8woody1_m68k.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-ia64/sup_1.8-8woody1_ia64.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-hppa/sup_1.8-8woody1_hppa.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-arm/sup_1.8-8woody1_arm.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-alpha/sup_1.8-8woody1_alpha.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-i386/sup_1.8-8woody1_i386.deb
stable/main/source/sup_1.8-8woody1.diff.gz
stable/main/source/sup_1.8-8woody1.dsc
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/source/squirrelmail_1.2.6-1.3.dsc
stable/main/binary-all/squirrelmail_1.2.6-1.3_all.deb
stable/main/source/squirrelmail_1.2.6-1.3.diff.gz
squirrelmail (1:1.2.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed cross site scripting problem in read_body.php (BugTraq ID 6302,
    CAN-2002-1341)


stable/main/binary-sparc/spamassassin_2.20-1woody3_sparc.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-s390/spamassassin_2.20-1woody3_s390.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-powerpc/spamassassin_2.20-1woody3_powerpc.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-mipsel/spamassassin_2.20-1woody3_mipsel.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-mips/spamassassin_2.20-1woody3_mips.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-m68k/spamassassin_2.20-1woody3_m68k.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-ia64/spamassassin_2.20-1woody3_ia64.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-hppa/spamassassin_2.20-1woody3_hppa.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-arm/spamassassin_2.20-1woody3_arm.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-alpha/spamassassin_2.20-1woody3_alpha.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-i386/spamassassin_2.20-1woody3_i386.deb
stable/main/source/spamassassin_2.20-1woody3.diff.gz
stable/main/source/spamassassin_2.20-1woody3.dsc
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-sparc/snort-common_1.8.4beta1-3.1_sparc.deb
stable/main/binary-sparc/snort_1.8.4beta1-3.1_sparc.deb
stable/main/binary-sparc/snort-mysql_1.8.4beta1-3.1_sparc.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-s390/snort-common_1.8.4beta1-3.1_s390.deb
stable/main/binary-s390/snort-mysql_1.8.4beta1-3.1_s390.deb
stable/main/binary-s390/snort_1.8.4beta1-3.1_s390.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-powerpc/snort-common_1.8.4beta1-3.1_powerpc.deb
stable/main/binary-powerpc/snort_1.8.4beta1-3.1_powerpc.deb
stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3.1_powerpc.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3.1_mipsel.deb
stable/main/binary-mipsel/snort_1.8.4beta1-3.1_mipsel.deb
stable/main/binary-mipsel/snort-common_1.8.4beta1-3.1_mipsel.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-mips/snort-common_1.8.4beta1-3.1_mips.deb
stable/main/binary-mips/snort-mysql_1.8.4beta1-3.1_mips.deb
stable/main/binary-mips/snort_1.8.4beta1-3.1_mips.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-m68k/snort_1.8.4beta1-3.1_m68k.deb
stable/main/binary-m68k/snort-mysql_1.8.4beta1-3.1_m68k.deb
stable/main/binary-m68k/snort-common_1.8.4beta1-3.1_m68k.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-ia64/snort-mysql_1.8.4beta1-3.1_ia64.deb
stable/main/binary-ia64/snort-common_1.8.4beta1-3.1_ia64.deb
stable/main/binary-ia64/snort_1.8.4beta1-3.1_ia64.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-i386/snort_1.8.4beta1-3.1_i386.deb
stable/main/binary-i386/snort-common_1.8.4beta1-3.1_i386.deb
stable/main/binary-i386/snort-mysql_1.8.4beta1-3.1_i386.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-hppa/snort-common_1.8.4beta1-3.1_hppa.deb
stable/main/binary-hppa/snort_1.8.4beta1-3.1_hppa.deb
stable/main/binary-hppa/snort-mysql_1.8.4beta1-3.1_hppa.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-arm/snort-common_1.8.4beta1-3.1_arm.deb
stable/main/binary-arm/snort-mysql_1.8.4beta1-3.1_arm.deb
stable/main/binary-arm/snort_1.8.4beta1-3.1_arm.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/source/snort_1.8.4beta1-3.1.diff.gz
stable/main/source/snort_1.8.4beta1-3.1.dsc
stable/main/binary-alpha/snort-common_1.8.4beta1-3.1_alpha.deb
stable/main/binary-all/snort-doc_1.8.4beta1-3.1_all.deb
stable/main/binary-all/snort-rules-default_1.8.4beta1-3.1_all.deb
stable/main/binary-alpha/snort-mysql_1.8.4beta1-3.1_alpha.deb
stable/main/binary-alpha/snort_1.8.4beta1-3.1_alpha.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-s390/libsnmpkit2_0.9-4.woody.2_s390.deb
stable/main/binary-s390/libsnmpkit-dev_0.9-4.woody.2_s390.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-powerpc/libsnmpkit2_0.9-4.woody.2_powerpc.deb
stable/main/binary-powerpc/libsnmpkit-dev_0.9-4.woody.2_powerpc.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mipsel/libsnmpkit-dev_0.9-4.woody.2_mipsel.deb
stable/main/binary-mipsel/libsnmpkit2_0.9-4.woody.2_mipsel.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mips/libsnmpkit2_0.9-4.woody.2_mips.deb
stable/main/binary-mips/libsnmpkit-dev_0.9-4.woody.2_mips.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-m68k/libsnmpkit-dev_0.9-4.woody.2_m68k.deb
stable/main/binary-m68k/libsnmpkit2_0.9-4.woody.2_m68k.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-ia64/libsnmpkit-dev_0.9-4.woody.2_ia64.deb
stable/main/binary-ia64/libsnmpkit2_0.9-4.woody.2_ia64.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-i386/libsnmpkit-dev_0.9-4.woody.2_i386.deb
stable/main/binary-i386/libsnmpkit2_0.9-4.woody.2_i386.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-hppa/libsnmpkit2_0.9-4.woody.2_hppa.deb
stable/main/binary-hppa/libsnmpkit-dev_0.9-4.woody.2_hppa.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-arm/libsnmpkit-dev_0.9-4.woody.2_arm.deb
stable/main/binary-arm/libsnmpkit2_0.9-4.woody.2_arm.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-alpha/libsnmpkit-dev_0.9-4.woody.2_alpha.deb
stable/main/binary-alpha/libsnmpkit2_0.9-4.woody.2_alpha.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/source/snmpkit_0.9-4.woody.2.diff.gz
stable/main/binary-sparc/libsnmpkit2_0.9-4.woody.2_sparc.deb
stable/main/source/snmpkit_0.9-4.woody.2.dsc
stable/main/binary-sparc/libsnmpkit-dev_0.9-4.woody.2_sparc.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-all/smb2www_980804-16.1_all.deb
stable/main/source/smb2www_980804-16.1.dsc
stable/main/source/smb2www_980804-16.1.diff.gz
smb2www (980804-16.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team, authored by current maintainer
    + wrote the GetCmbOutput() function to fork new process and execute
      commands without using shell.
    + decode input query only in one place (in decode_query()).
  * Thanks to Robert Luberda <robert@debian.org>


stable/main/binary-s390/slocate_2.6-1.3.1_s390.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-powerpc/slocate_2.6-1.3.1_powerpc.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-mipsel/slocate_2.6-1.3.1_mipsel.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-mips/slocate_2.6-1.3.1_mips.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-m68k/slocate_2.6-1.3.1_m68k.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-ia64/slocate_2.6-1.3.1_ia64.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-i386/slocate_2.6-1.3.1_i386.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-hppa/slocate_2.6-1.3.1_hppa.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-arm/slocate_2.6-1.3.1_arm.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-alpha/slocate_2.6-1.3.1_alpha.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/source/slocate_2.6-1.3.1.dsc
stable/main/source/slocate_2.6-1.3.1.diff.gz
stable/main/binary-sparc/slocate_2.6-1.3.1_sparc.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-sparc/slashem_0.0.6E4F8-4.0woody3_sparc.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-s390/slashem_0.0.6E4F8-4.0woody3_s390.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-powerpc/slashem_0.0.6E4F8-4.0woody3_powerpc.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-mipsel/slashem_0.0.6E4F8-4.0woody3_mipsel.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-mips/slashem_0.0.6E4F8-4.0woody3_mips.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-m68k/slashem_0.0.6E4F8-4.0woody3_m68k.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-ia64/slashem_0.0.6E4F8-4.0woody3_ia64.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-hppa/slashem_0.0.6E4F8-4.0woody3_hppa.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-arm/slashem_0.0.6E4F8-4.0woody3_arm.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-alpha/slashem_0.0.6E4F8-4.0woody3_alpha.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-i386/slashem_0.0.6E4F8-4.0woody3_i386.deb
stable/main/source/slashem_0.0.6E4F8-4.0woody3.dsc
stable/main/source/slashem_0.0.6E4F8-4.0woody3.diff.gz
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-sparc/skkserv_10.62a-4woody1_sparc.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-s390/skkserv_10.62a-4woody1_s390.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-powerpc/skkserv_10.62a-4woody1_powerpc.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-mipsel/skkserv_10.62a-4woody1_mipsel.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-mips/skkserv_10.62a-4woody1_mips.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-m68k/skkserv_10.62a-4woody1_m68k.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-ia64/skkserv_10.62a-4woody1_ia64.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-hppa/skkserv_10.62a-4woody1_hppa.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-arm/skkserv_10.62a-4woody1_arm.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-alpha/skkserv_10.62a-4woody1_alpha.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/skk_10.62a-4woody1_all.deb
stable/main/source/skk_10.62a-4woody1.dsc
stable/main/binary-i386/skkserv_10.62a-4woody1_i386.deb
stable/main/source/skk_10.62a-4woody1.diff.gz
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/shorewall_1.2.12-2_all.deb
stable/main/source/shorewall_1.2.12-2.diff.gz
stable/main/source/shorewall_1.2.12-2.dsc
stable/main/binary-all/shorewall-doc_1.2.12-2_all.deb
shorewall (1.2.12-2) stable; urgency=low
  * apply fix for shorewall not applying rate limiting, as defined in
    'shorewall.conf' as 'LOGRATE' and 'LOGBURST', to the rfc1918 logging as it
    does with all other logging.  This has denial of service potential on
    noisy networks. (closes: #206764)
  * dh_installinit is not used anymore to install the init script, it is
    installed by hand to avoid automatically startup and shutdown of the
    firewall during upgrade, install and remove. This should prevent network
    blackouts (closes: #165477)
  * the SUBSYSLOCK variable of shorewall.conf is set to "" because the
    initscript doesn't need it at all (closes: #209023)


stable/main/binary-sparc/sendmail-wide_8.12.3+3.5Wbeta-5.5_sparc.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-s390/sendmail-wide_8.12.3+3.5Wbeta-5.5_s390.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-powerpc/sendmail-wide_8.12.3+3.5Wbeta-5.5_powerpc.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-mipsel/sendmail-wide_8.12.3+3.5Wbeta-5.5_mipsel.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-mips/sendmail-wide_8.12.3+3.5Wbeta-5.5_mips.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-m68k/sendmail-wide_8.12.3+3.5Wbeta-5.5_m68k.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-ia64/sendmail-wide_8.12.3+3.5Wbeta-5.5_ia64.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-hppa/sendmail-wide_8.12.3+3.5Wbeta-5.5_hppa.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-arm/sendmail-wide_8.12.3+3.5Wbeta-5.5_arm.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-alpha/sendmail-wide_8.12.3+3.5Wbeta-5.5_alpha.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.dsc
stable/main/binary-i386/sendmail-wide_8.12.3+3.5Wbeta-5.5_i386.deb
stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.diff.gz
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-sparc/libmilter-dev_8.12.3-6.6_sparc.deb
stable/main/binary-sparc/sendmail_8.12.3-6.6_sparc.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-s390/sendmail_8.12.3-6.6_s390.deb
stable/main/binary-s390/libmilter-dev_8.12.3-6.6_s390.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-powerpc/libmilter-dev_8.12.3-6.6_powerpc.deb
stable/main/binary-powerpc/sendmail_8.12.3-6.6_powerpc.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-mipsel/sendmail_8.12.3-6.6_mipsel.deb
stable/main/binary-mipsel/libmilter-dev_8.12.3-6.6_mipsel.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-mips/sendmail_8.12.3-6.6_mips.deb
stable/main/binary-mips/libmilter-dev_8.12.3-6.6_mips.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-m68k/libmilter-dev_8.12.3-6.6_m68k.deb
stable/main/binary-m68k/sendmail_8.12.3-6.6_m68k.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-ia64/sendmail_8.12.3-6.6_ia64.deb
stable/main/binary-ia64/libmilter-dev_8.12.3-6.6_ia64.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-hppa/sendmail_8.12.3-6.6_hppa.deb
stable/main/binary-hppa/libmilter-dev_8.12.3-6.6_hppa.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-arm/sendmail_8.12.3-6.6_arm.deb
stable/main/binary-arm/libmilter-dev_8.12.3-6.6_arm.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-alpha/sendmail_8.12.3-6.6_alpha.deb
stable/main/binary-alpha/libmilter-dev_8.12.3-6.6_alpha.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-all/sendmail-doc_8.12.3-6.6_all.deb
stable/main/binary-i386/sendmail_8.12.3-6.6_i386.deb
stable/main/binary-i386/libmilter-dev_8.12.3-6.6_i386.deb
stable/main/source/sendmail_8.12.3-6.6.dsc
stable/main/source/sendmail_8.12.3-6.6.diff.gz
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-all/semi_1.14.3.cvs.2001.08.10-1woody2_all.deb
stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.dsc
stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.diff.gz
semi (1.14.3.cvs.2001.08.10-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Note CVE assignment in changelog (CAN-2003-0440)
  * No changes


stable/main/binary-sparc/libsane_1.0.7-4_sparc.deb
stable/main/binary-sparc/libsane-dev_1.0.7-4_sparc.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-s390/libsane_1.0.7-4_s390.deb
stable/main/binary-s390/libsane-dev_1.0.7-4_s390.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-powerpc/libsane_1.0.7-4_powerpc.deb
stable/main/binary-powerpc/libsane-dev_1.0.7-4_powerpc.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-mipsel/libsane_1.0.7-4_mipsel.deb
stable/main/binary-mipsel/libsane-dev_1.0.7-4_mipsel.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-mips/libsane_1.0.7-4_mips.deb
stable/main/binary-mips/libsane-dev_1.0.7-4_mips.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-m68k/libsane-dev_1.0.7-4_m68k.deb
stable/main/binary-m68k/libsane_1.0.7-4_m68k.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-ia64/libsane_1.0.7-4_ia64.deb
stable/main/binary-ia64/libsane-dev_1.0.7-4_ia64.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-hppa/libsane_1.0.7-4_hppa.deb
stable/main/binary-hppa/libsane-dev_1.0.7-4_hppa.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-arm/libsane-dev_1.0.7-4_arm.deb
stable/main/binary-arm/libsane_1.0.7-4_arm.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-alpha/libsane-dev_1.0.7-4_alpha.deb
stable/main/binary-alpha/libsane_1.0.7-4_alpha.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-i386/libsane-dev_1.0.7-4_i386.deb
stable/main/source/sane-backends_1.0.7-4.dsc
stable/main/binary-i386/libsane_1.0.7-4_i386.deb
stable/main/source/sane-backends_1.0.7-4.diff.gz
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-s390/swat_2.2.3a-12.3_s390.deb
stable/main/binary-s390/smbclient_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libpam-smbpass_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libsmbclient-dev_2.2.3a-12.3_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-12.3_s390.deb
stable/main/binary-s390/samba_2.2.3a-12.3_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-12.3_s390.deb
stable/main/binary-s390/winbind_2.2.3a-12.3_s390.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/samba_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/winbind_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-12.3_powerpc.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/smbclient_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/smbfs_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/samba-common_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-12.3_mipsel.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-mips/swat_2.2.3a-12.3_mips.deb
stable/main/binary-mips/winbind_2.2.3a-12.3_mips.deb
stable/main/binary-mips/samba_2.2.3a-12.3_mips.deb
stable/main/binary-mips/smbclient_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-12.3_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-12.3_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-12.3_mips.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-m68k/samba-common_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/winbind_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/swat_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/smbfs_2.2.3a-12.3_m68k.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-ia64/swat_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/smbclient_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libsmbclient_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/smbfs_2.2.3a-12.3_ia64.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-i386/libpam-smbpass_2.2.3a-12.3_i386.deb
stable/main/binary-i386/libsmbclient-dev_2.2.3a-12.3_i386.deb
stable/main/binary-i386/smbfs_2.2.3a-12.3_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-12.3_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-12.3_i386.deb
stable/main/binary-i386/samba-common_2.2.3a-12.3_i386.deb
stable/main/binary-i386/samba_2.2.3a-12.3_i386.deb
stable/main/binary-i386/winbind_2.2.3a-12.3_i386.deb
stable/main/binary-i386/swat_2.2.3a-12.3_i386.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-hppa/samba_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/swat_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libsmbclient_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-12.3_hppa.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-arm/samba_2.2.3a-12.3_arm.deb
stable/main/binary-arm/winbind_2.2.3a-12.3_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-12.3_arm.deb
stable/main/binary-arm/smbclient_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-12.3_arm.deb
stable/main/binary-arm/swat_2.2.3a-12.3_arm.deb
stable/main/binary-arm/samba-common_2.2.3a-12.3_arm.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-alpha/swat_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/smbclient_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libpam-smbpass_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-12.3_alpha.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-sparc/libpam-smbpass_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-12.3_sparc.deb
stable/main/source/samba_2.2.3a-12.3.dsc
stable/main/binary-sparc/samba_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/swat_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12.3_sparc.deb
stable/main/source/samba_2.2.3a-12.3.diff.gz
stable/main/binary-sparc/samba-common_2.2.3a-12.3_sparc.deb
stable/main/binary-all/samba-doc_2.2.3a-12.3_all.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-sparc/radiusd-cistron_1.6.6-1woody1_sparc.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-s390/radiusd-cistron_1.6.6-1woody1_s390.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-powerpc/radiusd-cistron_1.6.6-1woody1_powerpc.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-mipsel/radiusd-cistron_1.6.6-1woody1_mipsel.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-mips/radiusd-cistron_1.6.6-1woody1_mips.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-m68k/radiusd-cistron_1.6.6-1woody1_m68k.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-ia64/radiusd-cistron_1.6.6-1woody1_ia64.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-hppa/radiusd-cistron_1.6.6-1woody1_hppa.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-arm/radiusd-cistron_1.6.6-1woody1_arm.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-alpha/radiusd-cistron_1.6.6-1woody1_alpha.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/source/radiusd-cistron_1.6.6-1woody1.diff.gz
stable/main/binary-i386/radiusd-cistron_1.6.6-1woody1_i386.deb
stable/main/source/radiusd-cistron_1.6.6-1woody1.dsc
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-sparc/libproc-dev_2.0.7-8.woody1_sparc.deb
stable/main/binary-sparc/procps_2.0.7-8.woody1_sparc.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-s390/libproc-dev_2.0.7-8.woody1_s390.deb
stable/main/binary-s390/procps_2.0.7-8.woody1_s390.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-powerpc/libproc-dev_2.0.7-8.woody1_powerpc.deb
stable/main/binary-powerpc/procps_2.0.7-8.woody1_powerpc.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-mipsel/procps_2.0.7-8.woody1_mipsel.deb
stable/main/binary-mipsel/libproc-dev_2.0.7-8.woody1_mipsel.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-mips/libproc-dev_2.0.7-8.woody1_mips.deb
stable/main/binary-mips/procps_2.0.7-8.woody1_mips.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-m68k/procps_2.0.7-8.woody1_m68k.deb
stable/main/binary-m68k/libproc-dev_2.0.7-8.woody1_m68k.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-ia64/procps_2.0.7-8.woody1_ia64.deb
stable/main/binary-ia64/libproc-dev_2.0.7-8.woody1_ia64.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-hppa/libproc-dev_2.0.7-8.woody1_hppa.deb
stable/main/binary-hppa/procps_2.0.7-8.woody1_hppa.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-arm/procps_2.0.7-8.woody1_arm.deb
stable/main/binary-arm/libproc-dev_2.0.7-8.woody1_arm.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-alpha/procps_2.0.7-8.woody1_alpha.deb
stable/main/binary-alpha/libproc-dev_2.0.7-8.woody1_alpha.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/source/procps_2.0.7-8.woody1.dsc
stable/main/source/procps_2.0.7-8.woody1.diff.gz
stable/main/binary-i386/procps_2.0.7-8.woody1_i386.deb
stable/main/binary-i386/libproc-dev_2.0.7-8.woody1_i386.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-sparc/procmail_3.22-5_sparc.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-s390/procmail_3.22-5_s390.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-powerpc/procmail_3.22-5_powerpc.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-mipsel/procmail_3.22-5_mipsel.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-mips/procmail_3.22-5_mips.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-m68k/procmail_3.22-5_m68k.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-ia64/procmail_3.22-5_ia64.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-hppa/procmail_3.22-5_hppa.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-arm/procmail_3.22-5_arm.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-alpha/procmail_3.22-5_alpha.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/source/procmail_3.22-5.dsc
stable/main/binary-i386/procmail_3.22-5_i386.deb
stable/main/source/procmail_3.22-5.diff.gz
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-s390/pptpd_1.1.2-1.4_s390.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-powerpc/pptpd_1.1.2-1.4_powerpc.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-mipsel/pptpd_1.1.2-1.4_mipsel.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-mips/pptpd_1.1.2-1.4_mips.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-m68k/pptpd_1.1.2-1.4_m68k.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-ia64/pptpd_1.1.2-1.4_ia64.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-i386/pptpd_1.1.2-1.4_i386.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-hppa/pptpd_1.1.2-1.4_hppa.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-arm/pptpd_1.1.2-1.4_arm.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-alpha/pptpd_1.1.2-1.4_alpha.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-sparc/pptpd_1.1.2-1.4_sparc.deb
stable/main/source/pptpd_1.1.2-1.4.dsc
stable/main/source/pptpd_1.1.2-1.4.diff.gz
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-sparc/postgresql-client_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql-dev_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgtcl_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libecpg3_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgperl_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/python-pygresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgsql2_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/pgaccess_7.2.1-2woody4_sparc.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-s390/postgresql-contrib_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libecpg3_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql-dev_7.2.1-2woody4_s390.deb
stable/main/binary-s390/odbc-postgresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/python-pygresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql-client_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgtcl_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgsql2_7.2.1-2woody4_s390.deb
stable/main/binary-s390/pgaccess_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgperl_7.2.1-2woody4_s390.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-powerpc/python-pygresql_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-client_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgtcl_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgsql2_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/pgaccess_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libecpg3_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgperl_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql_7.2.1-2woody4_powerpc.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-mipsel/pgaccess_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgsql2_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-client_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libecpg3_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgperl_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgtcl_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/python-pygresql_7.2.1-2woody4_mipsel.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-mips/postgresql_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libecpg3_7.2.1-2woody4_mips.deb
stable/main/binary-mips/pgaccess_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-dev_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgtcl_7.2.1-2woody4_mips.deb
stable/main/binary-mips/odbc-postgresql_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgsql2_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgperl_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-contrib_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-client_7.2.1-2woody4_mips.deb
stable/main/binary-mips/python-pygresql_7.2.1-2woody4_mips.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-m68k/postgresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-dev_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/pgaccess_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-client_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/python-pygresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgperl_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgsql2_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libecpg3_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgtcl_7.2.1-2woody4_m68k.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-ia64/postgresql-dev_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libecpg3_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgperl_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/python-pygresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/pgaccess_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgtcl_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgsql2_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql-client_7.2.1-2woody4_ia64.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-hppa/postgresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-dev_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-client_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgperl_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/python-pygresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgsql2_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/pgaccess_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgtcl_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libecpg3_7.2.1-2woody4_hppa.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-arm/pgaccess_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-client_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-dev_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgsql2_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgtcl_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libecpg3_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-contrib_7.2.1-2woody4_arm.deb
stable/main/binary-arm/python-pygresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/odbc-postgresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgperl_7.2.1-2woody4_arm.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-alpha/pgaccess_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/python-pygresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-dev_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-client_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgsql2_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgtcl_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgperl_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libecpg3_7.2.1-2woody4_alpha.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-i386/pgaccess_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgperl_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql-contrib_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgsql2_7.2.1-2woody4_i386.deb
stable/main/binary-i386/python-pygresql_7.2.1-2woody4_i386.deb
stable/main/source/postgresql_7.2.1-2woody4.dsc
stable/main/binary-i386/odbc-postgresql_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgtcl_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql-dev_7.2.1-2woody4_i386.deb
stable/main/source/postgresql_7.2.1-2woody4.diff.gz
stable/main/binary-all/postgresql-doc_7.2.1-2woody4_all.deb
stable/main/binary-i386/postgresql-client_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libecpg3_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql_7.2.1-2woody4_i386.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-sparc/postfix-mysql_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix-pcre_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix-ldap_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix_1.1.11-0.woody3_sparc.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-s390/postfix-pcre_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix-mysql_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix-ldap_1.1.11-0.woody3_s390.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-powerpc/postfix-ldap_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix-mysql_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix-pcre_1.1.11-0.woody3_powerpc.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-mipsel/postfix_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-ldap_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-pcre_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-mysql_1.1.11-0.woody3_mipsel.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-mips/postfix_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-ldap_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-pcre_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-mysql_1.1.11-0.woody3_mips.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-m68k/postfix-ldap_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix-mysql_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix-pcre_1.1.11-0.woody3_m68k.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-ia64/postfix-mysql_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix-ldap_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix-pcre_1.1.11-0.woody3_ia64.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-hppa/postfix_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-mysql_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-pcre_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-ldap_1.1.11-0.woody3_hppa.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-arm/postfix_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-mysql_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-pcre_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-ldap_1.1.11-0.woody3_arm.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-alpha/postfix-mysql_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix-pcre_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix-ldap_1.1.11-0.woody3_alpha.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-i386/postfix-pcre_1.1.11-0.woody3_i386.deb
stable/main/binary-i386/postfix-mysql_1.1.11-0.woody3_i386.deb
stable/main/binary-i386/postfix-ldap_1.1.11-0.woody3_i386.deb
stable/main/source/postfix_1.1.11-0.woody3.dsc
stable/main/source/postfix_1.1.11-0.woody3.diff.gz
stable/main/binary-all/postfix-dev_1.1.11-0.woody3_all.deb
stable/main/binary-i386/postfix_1.1.11-0.woody3_i386.deb
stable/main/binary-all/postfix-doc_1.1.11-0.woody3_all.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody2_all.deb
stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.dsc
stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.diff.gz
stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody2_all.deb
phpgroupware (0.9.14-0.RC3.2.woody2) stable-security; urgency=high
  * Security fixes
    - Cross site scripting (CAN-2003-0504),
      see <http://www.security-corporation.com/articles-20030702-005.html>
    - sql insertion (CAN-2003-0657)
    - vfs storage in document dir now prohibited (CAN-2003-0599)
    - Remove $appdir in includes in tables_update.inc.php to prevent
      execution of arbitrary scripts.
    (These are the backports of the security fixes done upstream
    between version 0.9.14.003 and 0.9.14.006, see phpgroupware.org.)
    Closes: #201980.
  * Also: prohibit vfs storage in document dir in the old vfs class
    of filemanager product.


stable/main/binary-sparc/php4-imap_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-gd_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mysql_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4_4.1.2-6woody3_sparc.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-s390/php4-mcal_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-mhash_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-6woody3_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-6woody3_s390.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-powerpc/php4-xslt_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-ldap_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mcal_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-gd_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-sybase_4.1.2-6woody3_powerpc.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-mipsel/php4-gd_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mhash_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-recode_4.1.2-6woody3_mipsel.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-mips/php4-cgi_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mhash_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-sybase_4.1.2-6woody3_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-domxml_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-6woody3_mips.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-m68k/php4-curl_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/caudium-php4_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-sybase_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-6woody3_m68k.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-ia64/php4-odbc_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-snmp_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-gd_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-xslt_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-6woody3_ia64.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-hppa/php4_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mcal_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-cgi_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-odbc_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-gd_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mysql_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-sybase_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-imap_4.1.2-6woody3_hppa.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-arm/php4-mhash_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-6woody3_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-odbc_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-6woody3_arm.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-alpha/php4-mcal_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-ldap_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-mhash_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-imap_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4_4.1.2-6woody3_alpha.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-i386/php4-mysql_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-snmp_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-cgi_4.1.2-6woody3_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-gd_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-xslt_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-6woody3_i386.deb
stable/main/binary-all/php4-dev_4.1.2-6woody3_all.deb
stable/main/binary-i386/php4-ldap_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-mcal_4.1.2-6woody3_i386.deb
stable/main/source/php4_4.1.2-6woody3.diff.gz
stable/main/binary-all/php4-pear_4.1.2-6woody3_all.deb
stable/main/source/php4_4.1.2-6woody3.dsc
stable/main/binary-i386/php4-curl_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-mhash_4.1.2-6woody3_i386.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-sparc/perl_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-suid_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-debug_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-base_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/libperl-dev_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/libperl5.6_5.6.1-8.3_sparc.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-s390/perl_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-base_5.6.1-8.3_s390.deb
stable/main/binary-s390/libperl-dev_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-suid_5.6.1-8.3_s390.deb
stable/main/binary-s390/libperl5.6_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-debug_5.6.1-8.3_s390.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-powerpc/perl-suid_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl-debug_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/libperl-dev_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/libperl5.6_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl-base_5.6.1-8.3_powerpc.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-mipsel/perl-base_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl-debug_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/libperl5.6_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/libperl-dev_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl-suid_5.6.1-8.3_mipsel.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-mips/perl-debug_5.6.1-8.3_mips.deb
stable/main/binary-mips/libperl5.6_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl-suid_5.6.1-8.3_mips.deb
stable/main/binary-mips/libperl-dev_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl-base_5.6.1-8.3_mips.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-m68k/perl-debug_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl-suid_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/libperl5.6_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/libperl-dev_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl-base_5.6.1-8.3_m68k.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-ia64/libperl5.6_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/libperl-dev_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-base_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-suid_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-debug_5.6.1-8.3_ia64.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-hppa/perl-suid_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/libperl-dev_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/libperl5.6_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl-base_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl-debug_5.6.1-8.3_hppa.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-arm/perl-debug_5.6.1-8.3_arm.deb
stable/main/binary-arm/libperl5.6_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl-suid_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl-base_5.6.1-8.3_arm.deb
stable/main/binary-arm/libperl-dev_5.6.1-8.3_arm.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-alpha/perl_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-suid_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-base_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/libperl-dev_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-debug_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/libperl5.6_5.6.1-8.3_alpha.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-i386/perl_5.6.1-8.3_i386.deb
stable/main/source/perl_5.6.1-8.3.diff.gz
stable/main/binary-all/libcgi-fast-perl_5.6.1-8.3_all.deb
stable/main/binary-i386/perl-base_5.6.1-8.3_i386.deb
stable/main/binary-all/perl-modules_5.6.1-8.3_all.deb
stable/main/binary-i386/libperl-dev_5.6.1-8.3_i386.deb
stable/main/binary-all/perl-doc_5.6.1-8.3_all.deb
stable/main/binary-i386/libperl5.6_5.6.1-8.3_i386.deb
stable/main/source/perl_5.6.1-8.3.dsc
stable/main/binary-i386/perl-debug_5.6.1-8.3_i386.deb
stable/main/binary-i386/perl-suid_5.6.1-8.3_i386.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-powerpc/pcmcia-cs_3.1.33-6woody1_powerpc.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-arm/pcmcia-cs_3.1.33-6woody1_arm.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-alpha/pcmcia-cs_3.1.33-6woody1_alpha.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/source/pcmcia-cs_3.1.33-6woody1.diff.gz
stable/main/binary-i386/pcmcia-cs_3.1.33-6woody1_i386.deb
stable/main/binary-all/pcmcia-source_3.1.33-6woody1_all.deb
stable/main/source/pcmcia-cs_3.1.33-6woody1.dsc
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-sparc/orville-write_2.53-4woody1_sparc.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-s390/orville-write_2.53-4woody1_s390.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-powerpc/orville-write_2.53-4woody1_powerpc.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-mipsel/orville-write_2.53-4woody1_mipsel.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-mips/orville-write_2.53-4woody1_mips.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-m68k/orville-write_2.53-4woody1_m68k.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-ia64/orville-write_2.53-4woody1_ia64.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-hppa/orville-write_2.53-4woody1_hppa.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-arm/orville-write_2.53-4woody1_arm.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-alpha/orville-write_2.53-4woody1_alpha.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/source/orville-write_2.53-4woody1.dsc
stable/main/source/orville-write_2.53-4woody1.diff.gz
stable/main/binary-i386/orville-write_2.53-4woody1_i386.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-sparc/ssh-krb5_3.4p1-0woody4_sparc.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/ssh-krb5_3.4p1-0woody4_s390.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-powerpc/ssh-krb5_3.4p1-0woody4_powerpc.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mipsel/ssh-krb5_3.4p1-0woody4_mipsel.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mips/ssh-krb5_3.4p1-0woody4_mips.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-m68k/ssh-krb5_3.4p1-0woody4_m68k.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-ia64/ssh-krb5_3.4p1-0woody4_ia64.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-hppa/ssh-krb5_3.4p1-0woody4_hppa.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-arm/ssh-krb5_3.4p1-0woody4_arm.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-alpha/ssh-krb5_3.4p1-0woody4_alpha.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/source/openssh-krb5_3.4p1-0woody4.dsc
stable/main/binary-i386/ssh-krb5_3.4p1-0woody4_i386.deb
stable/main/source/openssh-krb5_3.4p1-0woody4.diff.gz
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-sparc/ssh_3.4p1-1.woody.3_sparc.deb
stable/main/binary-sparc/ssh-askpass-gnome_3.4p1-1.woody.3_sparc.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/ssh_3.4p1-1.woody.3_s390.deb
stable/main/binary-s390/ssh-askpass-gnome_3.4p1-1.woody.3_s390.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-powerpc/ssh_3.4p1-1.woody.3_powerpc.deb
stable/main/binary-powerpc/ssh-askpass-gnome_3.4p1-1.woody.3_powerpc.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mipsel/ssh_3.4p1-1.woody.3_mipsel.deb
stable/main/binary-mipsel/ssh-askpass-gnome_3.4p1-1.woody.3_mipsel.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mips/ssh_3.4p1-1.woody.3_mips.deb
stable/main/binary-mips/ssh-askpass-gnome_3.4p1-1.woody.3_mips.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-m68k/ssh-askpass-gnome_3.4p1-1.woody.3_m68k.deb
stable/main/binary-m68k/ssh_3.4p1-1.woody.3_m68k.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-ia64/ssh_3.4p1-1.woody.3_ia64.deb
stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1.woody.3_ia64.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-hppa/ssh_3.4p1-1.woody.3_hppa.deb
stable/main/binary-hppa/ssh-askpass-gnome_3.4p1-1.woody.3_hppa.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-arm/ssh-askpass-gnome_3.4p1-1.woody.3_arm.deb
stable/main/binary-arm/ssh_3.4p1-1.woody.3_arm.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-alpha/ssh-askpass-gnome_3.4p1-1.woody.3_alpha.deb
stable/main/binary-alpha/ssh_3.4p1-1.woody.3_alpha.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-i386/ssh-askpass-gnome_3.4p1-1.woody.3_i386.deb
stable/main/source/openssh_3.4p1-1.woody.3.diff.gz
stable/main/source/openssh_3.4p1-1.woody.3.dsc
stable/main/binary-i386/ssh_3.4p1-1.woody.3_i386.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/slapd_2.0.23-6.3_s390.deb
stable/main/binary-s390/ldap-gateways_2.0.23-6.3_s390.deb
stable/main/binary-s390/libldap2-dev_2.0.23-6.3_s390.deb
stable/main/binary-s390/libldap2_2.0.23-6.3_s390.deb
stable/main/binary-s390/ldap-utils_2.0.23-6.3_s390.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-powerpc/libldap2_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/libldap2-dev_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/ldap-utils_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/ldap-gateways_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/slapd_2.0.23-6.3_powerpc.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-mipsel/libldap2-dev_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/ldap-utils_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/ldap-gateways_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/slapd_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/libldap2_2.0.23-6.3_mipsel.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-mips/slapd_2.0.23-6.3_mips.deb
stable/main/binary-mips/libldap2-dev_2.0.23-6.3_mips.deb
stable/main/binary-mips/ldap-gateways_2.0.23-6.3_mips.deb
stable/main/binary-mips/libldap2_2.0.23-6.3_mips.deb
stable/main/binary-mips/ldap-utils_2.0.23-6.3_mips.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-m68k/slapd_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/ldap-utils_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/libldap2_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/ldap-gateways_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/libldap2-dev_2.0.23-6.3_m68k.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-ia64/libldap2-dev_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/libldap2_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/slapd_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/ldap-utils_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/ldap-gateways_2.0.23-6.3_ia64.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-i386/ldap-utils_2.0.23-6.3_i386.deb
stable/main/binary-i386/ldap-gateways_2.0.23-6.3_i386.deb
stable/main/binary-i386/libldap2-dev_2.0.23-6.3_i386.deb
stable/main/binary-i386/slapd_2.0.23-6.3_i386.deb
stable/main/binary-i386/libldap2_2.0.23-6.3_i386.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-hppa/slapd_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/libldap2_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/ldap-utils_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/libldap2-dev_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/ldap-gateways_2.0.23-6.3_hppa.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-arm/ldap-gateways_2.0.23-6.3_arm.deb
stable/main/binary-arm/slapd_2.0.23-6.3_arm.deb
stable/main/binary-arm/libldap2-dev_2.0.23-6.3_arm.deb
stable/main/binary-arm/ldap-utils_2.0.23-6.3_arm.deb
stable/main/binary-arm/libldap2_2.0.23-6.3_arm.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-alpha/libldap2_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/slapd_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/ldap-gateways_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/libldap2-dev_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/ldap-utils_2.0.23-6.3_alpha.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-sparc/ldap-utils_2.0.23-6.3_sparc.deb
stable/main/source/openldap2_2.0.23-6.3.diff.gz
stable/main/binary-sparc/libldap2_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/ldap-gateways_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/slapd_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/libldap2-dev_2.0.23-6.3_sparc.deb
stable/main/source/openldap2_2.0.23-6.3.dsc
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-s390/omega-rpg_0.90-pa9-7woody1_s390.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-powerpc/omega-rpg_0.90-pa9-7woody1_powerpc.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-mipsel/omega-rpg_0.90-pa9-7woody1_mipsel.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-mips/omega-rpg_0.90-pa9-7woody1_mips.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-m68k/omega-rpg_0.90-pa9-7woody1_m68k.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-ia64/omega-rpg_0.90-pa9-7woody1_ia64.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-i386/omega-rpg_0.90-pa9-7woody1_i386.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-hppa/omega-rpg_0.90-pa9-7woody1_hppa.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-arm/omega-rpg_0.90-pa9-7woody1_arm.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-alpha/omega-rpg_0.90-pa9-7woody1_alpha.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/source/omega-rpg_0.90-pa9-7woody1.diff.gz
stable/main/binary-sparc/omega-rpg_0.90-pa9-7woody1_sparc.deb
stable/main/source/omega-rpg_0.90-pa9-7woody1.dsc
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-sparc/nowebm_2.9a-7.3_sparc.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-s390/nowebm_2.9a-7.3_s390.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-powerpc/nowebm_2.9a-7.3_powerpc.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-mipsel/nowebm_2.9a-7.3_mipsel.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-mips/nowebm_2.9a-7.3_mips.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-m68k/nowebm_2.9a-7.3_m68k.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-hppa/nowebm_2.9a-7.3_hppa.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-arm/nowebm_2.9a-7.3_arm.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-alpha/nowebm_2.9a-7.3_alpha.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/source/noweb_2.9a-7.3.dsc
stable/main/binary-i386/nowebm_2.9a-7.3_i386.deb
stable/main/source/noweb_2.9a-7.3.diff.gz
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-s390/node_0.3.0a-2woody1_s390.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-powerpc/node_0.3.0a-2woody1_powerpc.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-mipsel/node_0.3.0a-2woody1_mipsel.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-mips/node_0.3.0a-2woody1_mips.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-m68k/node_0.3.0a-2woody1_m68k.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-ia64/node_0.3.0a-2woody1_ia64.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-i386/node_0.3.0a-2woody1_i386.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-hppa/node_0.3.0a-2woody1_hppa.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-arm/node_0.3.0a-2woody1_arm.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-alpha/node_0.3.0a-2woody1_alpha.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/source/node_0.3.0a-2woody1.diff.gz
stable/main/binary-sparc/node_0.3.0a-2woody1_sparc.deb
stable/main/source/node_0.3.0a-2woody1.dsc
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-sparc/netris_0.5-4woody1_sparc.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-s390/netris_0.5-4woody1_s390.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-powerpc/netris_0.5-4woody1_powerpc.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-mipsel/netris_0.5-4woody1_mipsel.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-mips/netris_0.5-4woody1_mips.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-m68k/netris_0.5-4woody1_m68k.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-ia64/netris_0.5-4woody1_ia64.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-hppa/netris_0.5-4woody1_hppa.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-arm/netris_0.5-4woody1_arm.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-alpha/netris_0.5-4woody1_alpha.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/source/netris_0.5-4woody1.diff.gz
stable/main/binary-i386/netris_0.5-4woody1_i386.deb
stable/main/source/netris_0.5-4woody1.dsc
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-sparc/libnetpbm9-dev_9.20-8.2_sparc.deb
stable/main/binary-sparc/libnetpbm9_9.20-8.2_sparc.deb
stable/main/binary-sparc/netpbm_9.20-8.2_sparc.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-s390/libnetpbm9-dev_9.20-8.2_s390.deb
stable/main/binary-s390/libnetpbm9_9.20-8.2_s390.deb
stable/main/binary-s390/netpbm_9.20-8.2_s390.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.2_powerpc.deb
stable/main/binary-powerpc/libnetpbm9_9.20-8.2_powerpc.deb
stable/main/binary-powerpc/netpbm_9.20-8.2_powerpc.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.2_mipsel.deb
stable/main/binary-mipsel/libnetpbm9_9.20-8.2_mipsel.deb
stable/main/binary-mipsel/netpbm_9.20-8.2_mipsel.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-mips/netpbm_9.20-8.2_mips.deb
stable/main/binary-mips/libnetpbm9_9.20-8.2_mips.deb
stable/main/binary-mips/libnetpbm9-dev_9.20-8.2_mips.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-m68k/netpbm_9.20-8.2_m68k.deb
stable/main/binary-m68k/libnetpbm9-dev_9.20-8.2_m68k.deb
stable/main/binary-m68k/libnetpbm9_9.20-8.2_m68k.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-ia64/netpbm_9.20-8.2_ia64.deb
stable/main/binary-ia64/libnetpbm9_9.20-8.2_ia64.deb
stable/main/binary-ia64/libnetpbm9-dev_9.20-8.2_ia64.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-i386/libnetpbm9-dev_9.20-8.2_i386.deb
stable/main/binary-i386/libnetpbm9_9.20-8.2_i386.deb
stable/main/binary-i386/netpbm_9.20-8.2_i386.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-arm/netpbm_9.20-8.2_arm.deb
stable/main/binary-arm/libnetpbm9_9.20-8.2_arm.deb
stable/main/binary-arm/libnetpbm9-dev_9.20-8.2_arm.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-alpha/netpbm_9.20-8.2_alpha.deb
stable/main/binary-alpha/libnetpbm9_9.20-8.2_alpha.deb
stable/main/binary-alpha/libnetpbm9-dev_9.20-8.2_alpha.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/source/netpbm-free_9.20-8.2.diff.gz
stable/main/binary-hppa/libnetpbm9_9.20-8.2_hppa.deb
stable/main/binary-hppa/netpbm_9.20-8.2_hppa.deb
stable/main/source/netpbm-free_9.20-8.2.dsc
stable/main/binary-hppa/libnetpbm9-dev_9.20-8.2_hppa.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-sparc/nano_1.0.6-3_sparc.deb
stable/main/binary-sparc/nano-udeb_1.0.6-3_sparc.udeb
stable/main/binary-sparc/nano-tiny_1.0.6-3_sparc.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-s390/nano-tiny_1.0.6-3_s390.deb
stable/main/binary-s390/nano-udeb_1.0.6-3_s390.udeb
stable/main/binary-s390/nano_1.0.6-3_s390.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-powerpc/nano_1.0.6-3_powerpc.deb
stable/main/binary-powerpc/nano-tiny_1.0.6-3_powerpc.deb
stable/main/binary-powerpc/nano-udeb_1.0.6-3_powerpc.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-mipsel/nano-tiny_1.0.6-3_mipsel.deb
stable/main/binary-mipsel/nano_1.0.6-3_mipsel.deb
stable/main/binary-mipsel/nano-udeb_1.0.6-3_mipsel.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-mips/nano-tiny_1.0.6-3_mips.deb
stable/main/binary-mips/nano_1.0.6-3_mips.deb
stable/main/binary-mips/nano-udeb_1.0.6-3_mips.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-m68k/nano_1.0.6-3_m68k.deb
stable/main/binary-m68k/nano-tiny_1.0.6-3_m68k.deb
stable/main/binary-m68k/nano-udeb_1.0.6-3_m68k.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-ia64/nano-tiny_1.0.6-3_ia64.deb
stable/main/binary-ia64/nano_1.0.6-3_ia64.deb
stable/main/binary-ia64/nano-udeb_1.0.6-3_ia64.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-hppa/nano-udeb_1.0.6-3_hppa.udeb
stable/main/binary-hppa/nano-tiny_1.0.6-3_hppa.deb
stable/main/binary-hppa/nano_1.0.6-3_hppa.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-arm/nano-udeb_1.0.6-3_arm.udeb
stable/main/binary-arm/nano-tiny_1.0.6-3_arm.deb
stable/main/binary-arm/nano_1.0.6-3_arm.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-alpha/nano-tiny_1.0.6-3_alpha.deb
stable/main/binary-alpha/nano-udeb_1.0.6-3_alpha.udeb
stable/main/binary-alpha/nano_1.0.6-3_alpha.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-i386/nano-udeb_1.0.6-3_i386.udeb
stable/main/source/nano_1.0.6-3.diff.gz
stable/main/binary-i386/nano_1.0.6-3_i386.deb
stable/main/binary-i386/nano-tiny_1.0.6-3_i386.deb
stable/main/source/nano_1.0.6-3.dsc
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-s390/mutt_1.3.28-2.2_s390.deb
stable/main/binary-s390/mutt-utf8_1.3.28-2.2_s390.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-powerpc/mutt-utf8_1.3.28-2.2_powerpc.deb
stable/main/binary-powerpc/mutt_1.3.28-2.2_powerpc.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-mipsel/mutt-utf8_1.3.28-2.2_mipsel.deb
stable/main/binary-mipsel/mutt_1.3.28-2.2_mipsel.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-mips/mutt_1.3.28-2.2_mips.deb
stable/main/binary-mips/mutt-utf8_1.3.28-2.2_mips.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-m68k/mutt-utf8_1.3.28-2.2_m68k.deb
stable/main/binary-m68k/mutt_1.3.28-2.2_m68k.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-ia64/mutt-utf8_1.3.28-2.2_ia64.deb
stable/main/binary-ia64/mutt_1.3.28-2.2_ia64.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-i386/mutt-utf8_1.3.28-2.2_i386.deb
stable/main/binary-i386/mutt_1.3.28-2.2_i386.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-hppa/mutt_1.3.28-2.2_hppa.deb
stable/main/binary-hppa/mutt-utf8_1.3.28-2.2_hppa.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-arm/mutt_1.3.28-2.2_arm.deb
stable/main/binary-arm/mutt-utf8_1.3.28-2.2_arm.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-alpha/mutt_1.3.28-2.2_alpha.deb
stable/main/binary-alpha/mutt-utf8_1.3.28-2.2_alpha.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/source/mutt_1.3.28-2.2.dsc
stable/main/source/mutt_1.3.28-2.2.diff.gz
stable/main/binary-sparc/mutt-utf8_1.3.28-2.2_sparc.deb
stable/main/binary-sparc/mutt_1.3.28-2.2_sparc.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-sparc/mozart_1.2.3.20011204-3woody1_sparc.deb
stable/main/binary-sparc/mozart-contrib_1.2.3.20011204-3woody1_sparc.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-powerpc/mozart-contrib_1.2.3.20011204-3woody1_powerpc.deb
stable/main/binary-powerpc/mozart_1.2.3.20011204-3woody1_powerpc.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-m68k/mozart_1.2.3.20011204-3woody1_m68k.deb
stable/main/binary-m68k/mozart-contrib_1.2.3.20011204-3woody1_m68k.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-i386/mozart-contrib_1.2.3.20011204-3woody1_i386.deb
stable/main/binary-all/mozart-doc-html_1.2.3.20011204-3woody1_all.deb
stable/main/binary-i386/mozart_1.2.3.20011204-3woody1_i386.deb
stable/main/source/mozart_1.2.3.20011204-3woody1.dsc
stable/main/source/mozart_1.2.3.20011204-3woody1.diff.gz
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-s390/xftp_2.2-18.1_s390.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-powerpc/xftp_2.2-18.1_powerpc.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-mipsel/xftp_2.2-18.1_mipsel.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-mips/xftp_2.2-18.1_mips.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-m68k/xftp_2.2-18.1_m68k.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-ia64/xftp_2.2-18.1_ia64.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-i386/xftp_2.2-18.1_i386.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-hppa/xftp_2.2-18.1_hppa.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-arm/xftp_2.2-18.1_arm.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-alpha/xftp_2.2-18.1_alpha.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/source/moxftp_2.2-18.1.dsc
stable/main/source/moxftp_2.2-18.1.diff.gz
stable/main/binary-sparc/xftp_2.2-18.1_sparc.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/source/minimalist_2.2-4.dsc
stable/main/source/minimalist_2.2-4.diff.gz
stable/main/binary-all/minimalist_2.2-4_all.deb
minimalist (2.2-4) stable-security; urgency=low
  * Added check to getAuth function that prevents remote code execution
    (CVE CAN-2003-0902) (Closes: Bug#218364)


stable/main/source/mindi_0.58.r5-1woody1.dsc
stable/main/binary-i386/mindi_0.58.r5-1woody1_i386.deb
stable/main/source/mindi_0.58.r5-1woody1.diff.gz
mindi (0.58.r5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jakob.Lell@web.de to create temporary files securely
    (CAN-2003-0617)
    [mindi]


stable/main/source/mime-support_3.18-1.3.dsc
stable/main/binary-all/mime-support_3.18-1.3_all.deb
stable/main/source/mime-support_3.18-1.3.tar.gz
mime-support (3.18-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Florian Zumbiehl <florz@gmx.de> to fix shell character
    expansion finally.


stable/main/binary-sparc/mikmod_3.1.6-4woody3_sparc.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-s390/mikmod_3.1.6-4woody3_s390.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-powerpc/mikmod_3.1.6-4woody3_powerpc.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-mipsel/mikmod_3.1.6-4woody3_mipsel.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-mips/mikmod_3.1.6-4woody3_mips.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-m68k/mikmod_3.1.6-4woody3_m68k.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-ia64/mikmod_3.1.6-4woody3_ia64.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-hppa/mikmod_3.1.6-4woody3_hppa.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-arm/mikmod_3.1.6-4woody3_arm.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-alpha/mikmod_3.1.6-4woody3_alpha.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/source/mikmod_3.1.6-4woody3.diff.gz
stable/main/source/mikmod_3.1.6-4woody3.dsc
stable/main/binary-i386/mikmod_3.1.6-4woody3_i386.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/source/mhonarc_2.5.2-1.3.dsc
stable/main/source/mhonarc_2.5.2-1.3.diff.gz
stable/main/binary-all/mhonarc_2.5.2-1.3_all.deb
mhonarc (2.5.2-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix another cross site scripting problem


stable/main/binary-s390/mhc-utils_0.25+20010625-7.1_s390.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-powerpc/mhc-utils_0.25+20010625-7.1_powerpc.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-mipsel/mhc-utils_0.25+20010625-7.1_mipsel.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-mips/mhc-utils_0.25+20010625-7.1_mips.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-ia64/mhc-utils_0.25+20010625-7.1_ia64.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-i386/mhc-utils_0.25+20010625-7.1_i386.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-hppa/mhc-utils_0.25+20010625-7.1_hppa.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-arm/mhc-utils_0.25+20010625-7.1_arm.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-alpha/mhc-utils_0.25+20010625-7.1_alpha.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-m68k/mhc-utils_0.25+20010625-7.1_m68k.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/source/mhc_0.25+20010625-7.1.dsc
stable/main/binary-sparc/mhc-utils_0.25+20010625-7.1_sparc.deb
stable/main/binary-all/mhc_0.25+20010625-7.1_all.deb
stable/main/source/mhc_0.25+20010625-7.1.diff.gz
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-sparc/marbles_1.0.2-1woody1_sparc.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-s390/marbles_1.0.2-1woody1_s390.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-powerpc/marbles_1.0.2-1woody1_powerpc.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-mipsel/marbles_1.0.2-1woody1_mipsel.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-mips/marbles_1.0.2-1woody1_mips.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-m68k/marbles_1.0.2-1woody1_m68k.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-ia64/marbles_1.0.2-1woody1_ia64.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-hppa/marbles_1.0.2-1woody1_hppa.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-arm/marbles_1.0.2-1woody1_arm.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-alpha/marbles_1.0.2-1woody1_alpha.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/source/marbles_1.0.2-1woody1.dsc
stable/main/source/marbles_1.0.2-1woody1.diff.gz
stable/main/binary-i386/marbles_1.0.2-1woody1_i386.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-sparc/man-db_2.3.20-18.woody.4_sparc.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-s390/man-db_2.3.20-18.woody.4_s390.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-powerpc/man-db_2.3.20-18.woody.4_powerpc.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-mipsel/man-db_2.3.20-18.woody.4_mipsel.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-mips/man-db_2.3.20-18.woody.4_mips.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-m68k/man-db_2.3.20-18.woody.4_m68k.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-ia64/man-db_2.3.20-18.woody.4_ia64.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-hppa/man-db_2.3.20-18.woody.4_hppa.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-arm/man-db_2.3.20-18.woody.4_arm.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-alpha/man-db_2.3.20-18.woody.4_alpha.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/source/man-db_2.3.20-18.woody.4.diff.gz
stable/main/binary-i386/man-db_2.3.20-18.woody.4_i386.deb
stable/main/source/man-db_2.3.20-18.woody.4.dsc
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-sparc/mah-jong_1.4-2_sparc.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-s390/mah-jong_1.4-2_s390.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-powerpc/mah-jong_1.4-2_powerpc.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-mipsel/mah-jong_1.4-2_mipsel.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-mips/mah-jong_1.4-2_mips.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-m68k/mah-jong_1.4-2_m68k.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-ia64/mah-jong_1.4-2_ia64.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-hppa/mah-jong_1.4-2_hppa.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-arm/mah-jong_1.4-2_arm.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-alpha/mah-jong_1.4-2_alpha.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/source/mah-jong_1.4-2.diff.gz
stable/main/source/mah-jong_1.4-2.dsc
stable/main/binary-i386/mah-jong_1.4-2_i386.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-sparc/lyskom-server_2.0.6-1woody1_sparc.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-s390/lyskom-server_2.0.6-1woody1_s390.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-powerpc/lyskom-server_2.0.6-1woody1_powerpc.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-mipsel/lyskom-server_2.0.6-1woody1_mipsel.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-mips/lyskom-server_2.0.6-1woody1_mips.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-m68k/lyskom-server_2.0.6-1woody1_m68k.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-ia64/lyskom-server_2.0.6-1woody1_ia64.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-hppa/lyskom-server_2.0.6-1woody1_hppa.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-arm/lyskom-server_2.0.6-1woody1_arm.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-alpha/lyskom-server_2.0.6-1woody1_alpha.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-i386/lyskom-server_2.0.6-1woody1_i386.deb
stable/main/source/lyskom-server_2.0.6-1woody1.dsc
stable/main/source/lyskom-server_2.0.6-1woody1.diff.gz
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-sparc/lv_4.49.4-7woody2_sparc.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-s390/lv_4.49.4-7woody2_s390.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-powerpc/lv_4.49.4-7woody2_powerpc.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-mipsel/lv_4.49.4-7woody2_mipsel.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-mips/lv_4.49.4-7woody2_mips.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-m68k/lv_4.49.4-7woody2_m68k.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-ia64/lv_4.49.4-7woody2_ia64.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-hppa/lv_4.49.4-7woody2_hppa.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-arm/lv_4.49.4-7woody2_arm.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-alpha/lv_4.49.4-7woody2_alpha.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/source/lv_4.49.4-7woody2.dsc
stable/main/binary-i386/lv_4.49.4-7woody2_i386.deb
stable/main/source/lv_4.49.4-7woody2.diff.gz
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-sparc/lprng_3.8.10-1.2_sparc.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-s390/lprng_3.8.10-1.2_s390.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-powerpc/lprng_3.8.10-1.2_powerpc.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mipsel/lprng_3.8.10-1.2_mipsel.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mips/lprng_3.8.10-1.2_mips.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-m68k/lprng_3.8.10-1.2_m68k.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-ia64/lprng_3.8.10-1.2_ia64.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-i386/lprng_3.8.10-1.2_i386.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-hppa/lprng_3.8.10-1.2_hppa.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-arm/lprng_3.8.10-1.2_arm.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/source/lprng_3.8.10-1.2.dsc
stable/main/binary-all/lprng-doc_3.8.10-1.2_all.deb
stable/main/binary-alpha/lprng_3.8.10-1.2_alpha.deb
stable/main/source/lprng_3.8.10-1.2.diff.gz
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-sparc/liece-dcc_2.0+0.20020217cvs-2.1_sparc.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-s390/liece-dcc_2.0+0.20020217cvs-2.1_s390.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-powerpc/liece-dcc_2.0+0.20020217cvs-2.1_powerpc.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-mipsel/liece-dcc_2.0+0.20020217cvs-2.1_mipsel.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-mips/liece-dcc_2.0+0.20020217cvs-2.1_mips.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-m68k/liece-dcc_2.0+0.20020217cvs-2.1_m68k.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-ia64/liece-dcc_2.0+0.20020217cvs-2.1_ia64.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-hppa/liece-dcc_2.0+0.20020217cvs-2.1_hppa.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-arm/liece-dcc_2.0+0.20020217cvs-2.1_arm.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-alpha/liece-dcc_2.0+0.20020217cvs-2.1_alpha.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-i386/liece-dcc_2.0+0.20020217cvs-2.1_i386.deb
stable/main/binary-all/liece_2.0+0.20020217cvs-2.1_all.deb
stable/main/source/liece_2.0+0.20020217cvs-2.1.dsc
stable/main/source/liece_2.0+0.20020217cvs-2.1.diff.gz
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-s390/libprinterconf0_0.5-4.woody.2_s390.deb
stable/main/binary-s390/pconf-detect_0.5-4.woody.2_s390.deb
stable/main/binary-s390/libprinterconf-dev_0.5-4.woody.2_s390.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-powerpc/libprinterconf-dev_0.5-4.woody.2_powerpc.deb
stable/main/binary-powerpc/libprinterconf0_0.5-4.woody.2_powerpc.deb
stable/main/binary-powerpc/pconf-detect_0.5-4.woody.2_powerpc.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mipsel/libprinterconf0_0.5-4.woody.2_mipsel.deb
stable/main/binary-mipsel/libprinterconf-dev_0.5-4.woody.2_mipsel.deb
stable/main/binary-mipsel/pconf-detect_0.5-4.woody.2_mipsel.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mips/libprinterconf-dev_0.5-4.woody.2_mips.deb
stable/main/binary-mips/libprinterconf0_0.5-4.woody.2_mips.deb
stable/main/binary-mips/pconf-detect_0.5-4.woody.2_mips.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-m68k/libprinterconf-dev_0.5-4.woody.2_m68k.deb
stable/main/binary-m68k/pconf-detect_0.5-4.woody.2_m68k.deb
stable/main/binary-m68k/libprinterconf0_0.5-4.woody.2_m68k.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-ia64/libprinterconf0_0.5-4.woody.2_ia64.deb
stable/main/binary-ia64/libprinterconf-dev_0.5-4.woody.2_ia64.deb
stable/main/binary-ia64/pconf-detect_0.5-4.woody.2_ia64.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-i386/pconf-detect_0.5-4.woody.2_i386.deb
stable/main/binary-i386/libprinterconf0_0.5-4.woody.2_i386.deb
stable/main/binary-i386/libprinterconf-dev_0.5-4.woody.2_i386.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-hppa/libprinterconf0_0.5-4.woody.2_hppa.deb
stable/main/binary-hppa/pconf-detect_0.5-4.woody.2_hppa.deb
stable/main/binary-hppa/libprinterconf-dev_0.5-4.woody.2_hppa.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-arm/pconf-detect_0.5-4.woody.2_arm.deb
stable/main/binary-arm/libprinterconf0_0.5-4.woody.2_arm.deb
stable/main/binary-arm/libprinterconf-dev_0.5-4.woody.2_arm.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-alpha/pconf-detect_0.5-4.woody.2_alpha.deb
stable/main/binary-alpha/libprinterconf0_0.5-4.woody.2_alpha.deb
stable/main/binary-alpha/libprinterconf-dev_0.5-4.woody.2_alpha.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-sparc/libprinterconf0_0.5-4.woody.2_sparc.deb
stable/main/source/libprinterconf_0.5-4.woody.2.dsc
stable/main/binary-sparc/libprinterconf-dev_0.5-4.woody.2_sparc.deb
stable/main/source/libprinterconf_0.5-4.woody.2.diff.gz
stable/main/binary-sparc/pconf-detect_0.5-4.woody.2_sparc.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-s390/libpng3_1.2.1-1.1.woody.3_s390.deb
stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.3_s390.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.3_powerpc.deb
stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.3_powerpc.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.3_mipsel.deb
stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.3_mipsel.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mips/libpng3_1.2.1-1.1.woody.3_mips.deb
stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.3_mips.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.3_m68k.deb
stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.3_m68k.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.3_ia64.deb
stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.3_ia64.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.3_i386.deb
stable/main/binary-i386/libpng3_1.2.1-1.1.woody.3_i386.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.3_hppa.deb
stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.3_hppa.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-arm/libpng3_1.2.1-1.1.woody.3_arm.deb
stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.3_arm.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.3_alpha.deb
stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.3_alpha.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.3_sparc.deb
stable/main/source/libpng3_1.2.1-1.1.woody.3.diff.gz
stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.3_sparc.deb
stable/main/source/libpng3_1.2.1-1.1.woody.3.dsc
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-s390/libpng2_1.0.12-3.woody.3_s390.deb
stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.3_s390.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.3_powerpc.deb
stable/main/binary-powerpc/libpng2_1.0.12-3.woody.3_powerpc.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mipsel/libpng2_1.0.12-3.woody.3_mipsel.deb
stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.3_mipsel.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mips/libpng2_1.0.12-3.woody.3_mips.deb
stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.3_mips.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.3_m68k.deb
stable/main/binary-m68k/libpng2_1.0.12-3.woody.3_m68k.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-ia64/libpng2_1.0.12-3.woody.3_ia64.deb
stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.3_ia64.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.3_i386.deb
stable/main/binary-i386/libpng2_1.0.12-3.woody.3_i386.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-hppa/libpng2_1.0.12-3.woody.3_hppa.deb
stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.3_hppa.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-arm/libpng2_1.0.12-3.woody.3_arm.deb
stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.3_arm.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-alpha/libpng2_1.0.12-3.woody.3_alpha.deb
stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.3_alpha.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/source/libpng_1.0.12-3.woody.3.dsc
stable/main/source/libpng_1.0.12-3.woody.3.diff.gz
stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.3_sparc.deb
stable/main/binary-sparc/libpng2_1.0.12-3.woody.3_sparc.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-all/libphp-adodb_1.51-1.1_all.deb
stable/main/source/libphp-adodb_1.51-1.1.dsc
stable/main/source/libphp-adodb_1.51-1.1.diff.gz
libphp-adodb (1.51-1.1) stable; urgency=low
  * Fix GetUpdateSQL() function problem. (Closes: #177332)
    Old function will update all datasets in the table, because the where
    statement wasn't created correctly.
  * Change maintainer name.


stable/main/binary-sparc/libparagui1.0_0.1.0-1_sparc.deb
stable/main/binary-sparc/libparagui1.0-dev_0.1.0-1_sparc.deb
stable/main/binary-sparc/paragui-themes_0.1.0-1_sparc.deb
libparagui1.0 (0.1.0-1) unstable; urgency=low
  * Initial Release (Closes: #109099)
  * added patch that let's paragui-config report /usr/include/paragui-1.0
    as the include directory


stable/main/binary-sparc/libpam-smb_1.1.6-1.1woody1_sparc.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-s390/libpam-smb_1.1.6-1.1woody1_s390.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-powerpc/libpam-smb_1.1.6-1.1woody1_powerpc.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-mipsel/libpam-smb_1.1.6-1.1woody1_mipsel.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-mips/libpam-smb_1.1.6-1.1woody1_mips.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-m68k/libpam-smb_1.1.6-1.1woody1_m68k.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-ia64/libpam-smb_1.1.6-1.1woody1_ia64.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-hppa/libpam-smb_1.1.6-1.1woody1_hppa.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-arm/libpam-smb_1.1.6-1.1woody1_arm.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-alpha/libpam-smb_1.1.6-1.1woody1_alpha.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/source/libpam-smb_1.1.6-1.1woody1.diff.gz
stable/main/binary-i386/libpam-smb_1.1.6-1.1woody1_i386.deb
stable/main/source/libpam-smb_1.1.6-1.1woody1.dsc
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/source/libmailtools-perl_1.44-1woody2.dsc
stable/main/binary-all/libmailtools-perl_1.44-1woody2_all.deb
stable/main/binary-all/mailtools_1.44-1woody2_all.deb
stable/main/source/libmailtools-perl_1.44-1woody2.diff.gz
libmailtools-perl (1.44-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove the 'mail' mailer entirely, as it is problematic.  This was the
    approach taken upstream and by other vendors, and as far as I can tell, no
    program specifically requests this buggy type of mailer interface
    (CAN-2002-1271)


stable/main/binary-sparc/liblocale-gettext-perl_1.01-11a.woody_sparc.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-s390/liblocale-gettext-perl_1.01-11a.woody_s390.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-powerpc/liblocale-gettext-perl_1.01-11a.woody_powerpc.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-mipsel/liblocale-gettext-perl_1.01-11a.woody_mipsel.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-mips/liblocale-gettext-perl_1.01-11a.woody_mips.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-m68k/liblocale-gettext-perl_1.01-11a.woody_m68k.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-ia64/liblocale-gettext-perl_1.01-11a.woody_ia64.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-hppa/liblocale-gettext-perl_1.01-11a.woody_hppa.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-arm/liblocale-gettext-perl_1.01-11a.woody_arm.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-alpha/liblocale-gettext-perl_1.01-11a.woody_alpha.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/source/liblocale-gettext-perl_1.01-11a.woody.dsc
stable/main/binary-i386/liblocale-gettext-perl_1.01-11a.woody_i386.deb
stable/main/source/liblocale-gettext-perl_1.01-11a.woody.diff.gz
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-ia64/libdbd-mysql-perl_1.2216-2.0.1_ia64.deb
libdbd-mysql-perl (1.2216-2.0.1) stable; urgency=low
  * Binary-only non-maintainer upload for ia64; no source changes.
  * Rebuild for ia64: Closes: #191552


stable/main/binary-sparc/leksbot_1.2-3.1woody1_sparc.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-s390/leksbot_1.2-3.1woody1_s390.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-powerpc/leksbot_1.2-3.1woody1_powerpc.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-mipsel/leksbot_1.2-3.1woody1_mipsel.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-mips/leksbot_1.2-3.1woody1_mips.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-m68k/leksbot_1.2-3.1woody1_m68k.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-ia64/leksbot_1.2-3.1woody1_ia64.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-hppa/leksbot_1.2-3.1woody1_hppa.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-arm/leksbot_1.2-3.1woody1_arm.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-alpha/leksbot_1.2-3.1woody1_alpha.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/source/leksbot_1.2-3.1woody1.diff.gz
stable/main/source/leksbot_1.2-3.1woody1.dsc
stable/main/binary-i386/leksbot_1.2-3.1woody1_i386.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-s390/krb5-kdc_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkrb5-dev_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-admin-server_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody4_s390.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkrb53_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkadm55_1.2.4-5woody4_powerpc.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-mipsel/krb5-clients_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkadm55_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkrb53_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody4_mipsel.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkrb53_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkadm55_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody4_mips.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-m68k/krb5-user_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-kdc_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody4_m68k.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-ia64/libkadm55_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/libkrb53_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody4_ia64.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-i386/krb5-clients_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-telnetd_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkrb53_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody4_i386.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-hppa/krb5-kdc_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkrb53_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkadm55_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody4_hppa.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-arm/krb5-user_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-admin-server_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-kdc_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-telnetd_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody4_arm.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-user_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody4_alpha.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody4_sparc.deb
stable/main/source/krb5_1.2.4-5woody4.dsc
stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody4_sparc.deb
stable/main/binary-all/krb5-doc_1.2.4-5woody4_all.deb
stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody4_sparc.deb
stable/main/source/krb5_1.2.4-5woody4.diff.gz
stable/main/binary-sparc/libkadm55_1.2.4-5woody4_sparc.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-all/kernel-doc-2.4.18_2.4.18-13_all.deb
stable/main/source/kernel-source-2.4.18_2.4.18-13.diff.gz
stable/main/binary-all/kernel-source-2.4.18_2.4.18-13_all.deb
stable/main/source/kernel-source-2.4.18_2.4.18-13.dsc
kernel-source-2.4.18 (2.4.18-13) stable-security; urgency=high
  * Fixed steal_locks race introduced in 2.4.18-10:
    . fs/binfmt_elf.c
    . fs/exec.c


stable/main/binary-sparc/mkcramfs_2.4.17-1woody1_sparc.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-s390/mkcramfs_2.4.17-1woody1_s390.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-powerpc/mkcramfs_2.4.17-1woody1_powerpc.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mipsel/mkcramfs_2.4.17-1woody1_mipsel.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mips/mkcramfs_2.4.17-1woody1_mips.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-m68k/mkcramfs_2.4.17-1woody1_m68k.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-ia64/mkcramfs_2.4.17-1woody1_ia64.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-hppa/mkcramfs_2.4.17-1woody1_hppa.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-arm/mkcramfs_2.4.17-1woody1_arm.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-alpha/mkcramfs_2.4.17-1woody1_alpha.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody1_all.deb
stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody1_all.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.dsc
stable/main/binary-i386/mkcramfs_2.4.17-1woody1_i386.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.diff.gz
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody1_mips.deb
stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1_all.deb
stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody1_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.tar.gz
stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody1_mips.deb
stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody1_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.dsc
kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody1) stable-security; urgency=high
  * fix ptrace security hole


stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody1_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody1_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody1_powerpc.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.tar.gz
stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody1_powerpc.deb
stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody1_all.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.dsc
kernel-patch-2.4.18-powerpc (2.4.18-1woody1) stable; urgency=high
  * Build against kernel-source-2.4.18 version 2.4.18-9 to pick up
    security fixes.
  * Backport change from unstable to disable CMD640 support - fixes some
    boot failures.


stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.dsc
stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1_all.deb
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.diff.gz
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1.1) stable-security; urgency=high
  * NMU
  * Added an s390 specific patch for the ptrace vulnerability,
    provided by Martin Schwidefsky <schwidefsky@de.ibm.com>.


stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody2_mipsel.deb
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low
  * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1
  * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes:
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions
  * remove Readme.Debian from the diff


stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb
stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb
stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc
stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low
  * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1
  * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes:
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions
  * remove Readme.Debian from the diff


stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.dsc
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.tar.gz
stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.2.2_s390.deb
stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2_s390.deb
kernel-image-2.4.17-s390 (2.4.17-2.woody.2.2) stable-security; urgency=high
  * NMU
  * revert accidental configuration changes


stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.tar.gz
stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody3_i386.deb
stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.dsc
kernel-image-2.2.20-i386 (2.2.20-5woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuild with pcmcia-cs from stable-security so that katie ACCEPTs us


stable/main/binary-sparc/kmtrace_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kbabel_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kbabel-dev_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kspy_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kdesdk_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/poxml_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kstartperf_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kexample_2.2.2-3.2_sparc.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/kbabel_2.2.2-3.2_s390.deb
stable/main/binary-s390/kdesdk_2.2.2-3.2_s390.deb
stable/main/binary-s390/kmtrace_2.2.2-3.2_s390.deb
stable/main/binary-s390/kspy_2.2.2-3.2_s390.deb
stable/main/binary-s390/kstartperf_2.2.2-3.2_s390.deb
stable/main/binary-s390/kexample_2.2.2-3.2_s390.deb
stable/main/binary-s390/poxml_2.2.2-3.2_s390.deb
stable/main/binary-s390/kbabel-dev_2.2.2-3.2_s390.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/kbabel-dev_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kdesdk_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kstartperf_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kspy_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kbabel_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/poxml_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kmtrace_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kexample_2.2.2-3.2_powerpc.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/kexample_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kmtrace_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kbabel-dev_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kstartperf_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kbabel_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kspy_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/poxml_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kdesdk_2.2.2-3.2_mipsel.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/poxml_2.2.2-3.2_mips.deb
stable/main/binary-mips/kbabel-dev_2.2.2-3.2_mips.deb
stable/main/binary-mips/kmtrace_2.2.2-3.2_mips.deb
stable/main/binary-mips/kspy_2.2.2-3.2_mips.deb
stable/main/binary-mips/kbabel_2.2.2-3.2_mips.deb
stable/main/binary-mips/kexample_2.2.2-3.2_mips.deb
stable/main/binary-mips/kdesdk_2.2.2-3.2_mips.deb
stable/main/binary-mips/kstartperf_2.2.2-3.2_mips.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/kbabel-dev_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/poxml_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kmtrace_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kexample_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kbabel_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kstartperf_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kspy_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kdesdk_2.2.2-3.2_m68k.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kdesdk_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kspy_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kmtrace_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kexample_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kbabel_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/poxml_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kbabel-dev_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kstartperf_2.2.2-3.2_ia64.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kstartperf_2.2.2-3.2_i386.deb
stable/main/binary-i386/kspy_2.2.2-3.2_i386.deb
stable/main/binary-i386/kbabel_2.2.2-3.2_i386.deb
stable/main/binary-i386/kdesdk_2.2.2-3.2_i386.deb
stable/main/binary-i386/kexample_2.2.2-3.2_i386.deb
stable/main/binary-i386/kmtrace_2.2.2-3.2_i386.deb
stable/main/binary-i386/kbabel-dev_2.2.2-3.2_i386.deb
stable/main/binary-i386/poxml_2.2.2-3.2_i386.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kstartperf_2.2.2-3.2_arm.deb
stable/main/binary-arm/kspy_2.2.2-3.2_arm.deb
stable/main/binary-arm/kmtrace_2.2.2-3.2_arm.deb
stable/main/binary-arm/kdesdk_2.2.2-3.2_arm.deb
stable/main/binary-arm/poxml_2.2.2-3.2_arm.deb
stable/main/binary-arm/kbabel-dev_2.2.2-3.2_arm.deb
stable/main/binary-arm/kbabel_2.2.2-3.2_arm.deb
stable/main/binary-arm/kexample_2.2.2-3.2_arm.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/poxml_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kbabel_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kmtrace_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kstartperf_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kexample_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kdesdk_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kbabel-dev_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kspy_2.2.2-3.2_alpha.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/poxml_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kexample_2.2.2-3.2_hppa.deb
stable/main/binary-all/kdesdk-scripts_2.2.2-3.2_all.deb
stable/main/binary-hppa/kdesdk_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kbabel_2.2.2-3.2_hppa.deb
stable/main/source/kdesdk_2.2.2-3.2.dsc
stable/main/binary-hppa/kstartperf_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kbabel-dev_2.2.2-3.2_hppa.deb
stable/main/binary-all/kdepalettes_2.2.2-3.2_all.deb
stable/main/binary-hppa/kmtrace_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kspy_2.2.2-3.2_hppa.deb
stable/main/source/kdesdk_2.2.2-3.2.diff.gz
stable/main/binary-all/kapptemplate_2.2.2-3.2_all.deb
stable/main/binary-all/kdesdk-doc_2.2.2-3.2_all.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/kmail_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/klisa_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libmimelib-dev_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libkdenetwork1_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/korn_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/knewsticker_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/knode_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libmimelib1_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/ksirc_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/ktalkd_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kit_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kdict_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kppp_2.2.2-14.6_sparc.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-s390/kit_2.2.2-14.6_s390.deb
stable/main/binary-s390/libmimelib-dev_2.2.2-14.6_s390.deb
stable/main/binary-s390/klisa_2.2.2-14.6_s390.deb
stable/main/binary-s390/kdict_2.2.2-14.6_s390.deb
stable/main/binary-s390/ksirc_2.2.2-14.6_s390.deb
stable/main/binary-s390/korn_2.2.2-14.6_s390.deb
stable/main/binary-s390/kppp_2.2.2-14.6_s390.deb
stable/main/binary-s390/knode_2.2.2-14.6_s390.deb
stable/main/binary-s390/libmimelib1_2.2.2-14.6_s390.deb
stable/main/binary-s390/libkdenetwork1_2.2.2-14.6_s390.deb
stable/main/binary-s390/kmail_2.2.2-14.6_s390.deb
stable/main/binary-s390/knewsticker_2.2.2-14.6_s390.deb
stable/main/binary-s390/ktalkd_2.2.2-14.6_s390.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-powerpc/ksirc_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libmimelib1_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kdict_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/korn_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kmail_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/knode_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/ktalkd_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/klisa_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/knewsticker_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kit_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kppp_2.2.2-14.6_powerpc.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-mipsel/kdict_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/ksirc_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libmimelib1_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/klisa_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kppp_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/korn_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kit_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kmail_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/knewsticker_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/knode_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/ktalkd_2.2.2-14.6_mipsel.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-mips/korn_2.2.2-14.6_mips.deb
stable/main/binary-mips/kppp_2.2.2-14.6_mips.deb
stable/main/binary-mips/libkdenetwork1_2.2.2-14.6_mips.deb
stable/main/binary-mips/kit_2.2.2-14.6_mips.deb
stable/main/binary-mips/kdict_2.2.2-14.6_mips.deb
stable/main/binary-mips/kmail_2.2.2-14.6_mips.deb
stable/main/binary-mips/klisa_2.2.2-14.6_mips.deb
stable/main/binary-mips/ktalkd_2.2.2-14.6_mips.deb
stable/main/binary-mips/libmimelib1_2.2.2-14.6_mips.deb
stable/main/binary-mips/libmimelib-dev_2.2.2-14.6_mips.deb
stable/main/binary-mips/ksirc_2.2.2-14.6_mips.deb
stable/main/binary-mips/knode_2.2.2-14.6_mips.deb
stable/main/binary-mips/knewsticker_2.2.2-14.6_mips.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-m68k/libkdenetwork1_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kmail_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/libmimelib1_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kppp_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/korn_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/knewsticker_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/libmimelib-dev_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/ksirc_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/ktalkd_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kit_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/knode_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kdict_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/klisa_2.2.2-14.6_m68k.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-hppa/libmimelib-dev_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/libkdenetwork1_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/libmimelib1_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kmail_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kppp_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/knewsticker_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/korn_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/ktalkd_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/klisa_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/knode_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/ksirc_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kdict_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kit_2.2.2-14.6_hppa.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-arm/knewsticker_2.2.2-14.6_arm.deb
stable/main/binary-arm/libmimelib-dev_2.2.2-14.6_arm.deb
stable/main/binary-arm/kmail_2.2.2-14.6_arm.deb
stable/main/binary-arm/kppp_2.2.2-14.6_arm.deb
stable/main/binary-arm/kdict_2.2.2-14.6_arm.deb
stable/main/binary-arm/libkdenetwork1_2.2.2-14.6_arm.deb
stable/main/binary-arm/korn_2.2.2-14.6_arm.deb
stable/main/binary-arm/klisa_2.2.2-14.6_arm.deb
stable/main/binary-arm/ktalkd_2.2.2-14.6_arm.deb
stable/main/binary-arm/ksirc_2.2.2-14.6_arm.deb
stable/main/binary-arm/knode_2.2.2-14.6_arm.deb
stable/main/binary-arm/kit_2.2.2-14.6_arm.deb
stable/main/binary-arm/libmimelib1_2.2.2-14.6_arm.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-alpha/knode_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kit_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kppp_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kdict_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/klisa_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/ksirc_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libmimelib1_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libkdenetwork1_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/knewsticker_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libmimelib-dev_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kmail_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/ktalkd_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/korn_2.2.2-14.6_alpha.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-ia64/libkdenetwork1_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kit_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/libmimelib1_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/klisa_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kmail_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/ktalkd_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kppp_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kdict_2.2.2-14.6_ia64.deb
stable/main/source/kdenetwork_2.2.2-14.6.diff.gz
stable/main/binary-ia64/libmimelib-dev_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/ksirc_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/knewsticker_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/knode_2.2.2-14.6_ia64.deb
stable/main/source/kdenetwork_2.2.2-14.6.dsc
stable/main/binary-ia64/korn_2.2.2-14.6_ia64.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.8_sparc.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.8_s390.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libkmid_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.8_powerpc.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.8_mipsel.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.8_mips.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libkmid_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.8_m68k.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-ia64/libkmid_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.8_ia64.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.8_hppa.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-arm/libarts_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.8_arm.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.8_alpha.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.8_i386.deb
stable/main/source/kdelibs_2.2.2-13.woody.8.dsc
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.8_all.deb
stable/main/source/kdelibs_2.2.2-13.woody.8.diff.gz
stable/main/binary-i386/libkmid_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libarts_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.8_i386.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-sparc/kcoloredit_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kpaint_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kooka_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/libkscan-dev_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kfract_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/ksnapshot_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kamera_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/libkscan1_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kghostview_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kiconedit_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kview_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kruler_2.2.2-6.11_sparc.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-s390/kiconedit_2.2.2-6.11_s390.deb
stable/main/binary-s390/ksnapshot_2.2.2-6.11_s390.deb
stable/main/binary-s390/libkscan1_2.2.2-6.11_s390.deb
stable/main/binary-s390/kview_2.2.2-6.11_s390.deb
stable/main/binary-s390/kcoloredit_2.2.2-6.11_s390.deb
stable/main/binary-s390/kamera_2.2.2-6.11_s390.deb
stable/main/binary-s390/kfract_2.2.2-6.11_s390.deb
stable/main/binary-s390/libkscan-dev_2.2.2-6.11_s390.deb
stable/main/binary-s390/kruler_2.2.2-6.11_s390.deb
stable/main/binary-s390/kooka_2.2.2-6.11_s390.deb
stable/main/binary-s390/kpaint_2.2.2-6.11_s390.deb
stable/main/binary-s390/kghostview_2.2.2-6.11_s390.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-powerpc/kamera_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/ksnapshot_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kview_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/libkscan1_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kfract_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kooka_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kpaint_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kghostview_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kiconedit_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kruler_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kcoloredit_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/libkscan-dev_2.2.2-6.11_powerpc.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-mipsel/kghostview_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kiconedit_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/ksnapshot_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kamera_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/libkscan1_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kfract_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kcoloredit_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kruler_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kooka_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/libkscan-dev_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kview_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kpaint_2.2.2-6.11_mipsel.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-mips/kiconedit_2.2.2-6.11_mips.deb
stable/main/binary-mips/kfract_2.2.2-6.11_mips.deb
stable/main/binary-mips/kooka_2.2.2-6.11_mips.deb
stable/main/binary-mips/kghostview_2.2.2-6.11_mips.deb
stable/main/binary-mips/kpaint_2.2.2-6.11_mips.deb
stable/main/binary-mips/libkscan-dev_2.2.2-6.11_mips.deb
stable/main/binary-mips/kview_2.2.2-6.11_mips.deb
stable/main/binary-mips/kruler_2.2.2-6.11_mips.deb
stable/main/binary-mips/ksnapshot_2.2.2-6.11_mips.deb
stable/main/binary-mips/kcoloredit_2.2.2-6.11_mips.deb
stable/main/binary-mips/kamera_2.2.2-6.11_mips.deb
stable/main/binary-mips/libkscan1_2.2.2-6.11_mips.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-m68k/kpaint_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kcoloredit_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kghostview_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kooka_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kfract_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/libkscan-dev_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kamera_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/ksnapshot_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kruler_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kiconedit_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kview_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/libkscan1_2.2.2-6.11_m68k.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-ia64/kghostview_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kruler_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/libkscan-dev_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/ksnapshot_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kooka_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kpaint_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kview_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kfract_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kiconedit_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/libkscan1_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kamera_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kcoloredit_2.2.2-6.11_ia64.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-i386/libkscan1_2.2.2-6.11_i386.deb
stable/main/binary-i386/kpaint_2.2.2-6.11_i386.deb
stable/main/binary-i386/kiconedit_2.2.2-6.11_i386.deb
stable/main/binary-i386/kooka_2.2.2-6.11_i386.deb
stable/main/binary-i386/kruler_2.2.2-6.11_i386.deb
stable/main/binary-i386/libkscan-dev_2.2.2-6.11_i386.deb
stable/main/binary-i386/ksnapshot_2.2.2-6.11_i386.deb
stable/main/binary-i386/kfract_2.2.2-6.11_i386.deb
stable/main/binary-i386/kamera_2.2.2-6.11_i386.deb
stable/main/binary-i386/kghostview_2.2.2-6.11_i386.deb
stable/main/binary-i386/kcoloredit_2.2.2-6.11_i386.deb
stable/main/binary-i386/kview_2.2.2-6.11_i386.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-hppa/kview_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kcoloredit_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kfract_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kruler_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kghostview_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kamera_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kiconedit_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/ksnapshot_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kpaint_2.2.2-6.11_hppa.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-alpha/kiconedit_2.2.2-6.11_alpha.deb
stable/main/source/kdegraphics_2.2.2-6.11.diff.gz
stable/main/binary-alpha/libkscan1_2.2.2-6.11_alpha.deb
stable/main/source/kdegraphics_2.2.2-6.11.dsc
stable/main/binary-alpha/kcoloredit_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kview_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kamera_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kfract_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/libkscan-dev_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kruler_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kghostview_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kooka_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kpaint_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/ksnapshot_2.2.2-6.11_alpha.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-sparc/konsole_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libkonq3_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kscreensaver_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kate_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/konqueror_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-dev_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libkonq-dev_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdm_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-libs_2.2.2-14.7_sparc.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-s390/kdebase-dev_2.2.2-14.7_s390.deb
stable/main/binary-s390/kate_2.2.2-14.7_s390.deb
stable/main/binary-s390/kscreensaver_2.2.2-14.7_s390.deb
stable/main/binary-s390/konqueror_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdm_2.2.2-14.7_s390.deb
stable/main/binary-s390/libkonq-dev_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase_2.2.2-14.7_s390.deb
stable/main/binary-s390/libkonq3_2.2.2-14.7_s390.deb
stable/main/binary-s390/konsole_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase-libs_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.7_s390.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-powerpc/kdebase-libs_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdm_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kate_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kscreensaver_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/konsole_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libkonq-dev_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/konqueror_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase-dev_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libkonq3_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.7_powerpc.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-mipsel/kdebase-libs_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdm_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kscreensaver_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kate_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libkonq3_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase-dev_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/konsole_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libkonq-dev_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/konqueror_2.2.2-14.7_mipsel.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-mips/konsole_2.2.2-14.7_mips.deb
stable/main/binary-mips/libkonq-dev_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-libs_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdm_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase_2.2.2-14.7_mips.deb
stable/main/binary-mips/kate_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-dev_2.2.2-14.7_mips.deb
stable/main/binary-mips/konqueror_2.2.2-14.7_mips.deb
stable/main/binary-mips/kscreensaver_2.2.2-14.7_mips.deb
stable/main/binary-mips/libkonq3_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.7_mips.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-m68k/konqueror_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/konsole_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-libs_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdm_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libkonq3_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kscreensaver_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libkonq-dev_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-dev_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kate_2.2.2-14.7_m68k.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-ia64/kate_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-dev_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdm_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kscreensaver_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/konsole_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libkonq3_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libkonq-dev_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-libs_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/konqueror_2.2.2-14.7_ia64.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-hppa/konqueror_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/konsole_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdm_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libkonq3_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kscreensaver_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kate_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-libs_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-dev_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libkonq-dev_2.2.2-14.7_hppa.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-arm/kscreensaver_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdm_2.2.2-14.7_arm.deb
stable/main/binary-arm/libkonq-dev_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase_2.2.2-14.7_arm.deb
stable/main/binary-arm/konsole_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.7_arm.deb
stable/main/binary-arm/libkonq3_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-libs_2.2.2-14.7_arm.deb
stable/main/binary-arm/konqueror_2.2.2-14.7_arm.deb
stable/main/binary-arm/kate_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-dev_2.2.2-14.7_arm.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-alpha/kdebase-dev_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kate_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libkonq-dev_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libkonq3_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/konsole_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/konqueror_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kscreensaver_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase-libs_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdm_2.2.2-14.7_alpha.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/source/kdebase_2.2.2-14.7.dsc
stable/main/binary-i386/konqueror_2.2.2-14.7_i386.deb
stable/main/binary-i386/kscreensaver_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-libs_2.2.2-14.7_i386.deb
stable/main/binary-i386/libkonq-dev_2.2.2-14.7_i386.deb
stable/main/binary-i386/konsole_2.2.2-14.7_i386.deb
stable/main/source/kdebase_2.2.2-14.7.diff.gz
stable/main/binary-i386/kdebase_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdm_2.2.2-14.7_i386.deb
stable/main/binary-all/kdebase-doc_2.2.2-14.7_all.deb
stable/main/binary-i386/kate_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-dev_2.2.2-14.7_i386.deb
stable/main/binary-i386/libkonq3_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.7_i386.deb
stable/main/binary-all/kdewallpapers_2.2.2-14.7_all.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-sparc/jnethack_1.1.5-11woody2_sparc.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-s390/jnethack_1.1.5-11woody2_s390.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-powerpc/jnethack_1.1.5-11woody2_powerpc.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-mipsel/jnethack_1.1.5-11woody2_mipsel.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-mips/jnethack_1.1.5-11woody2_mips.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-m68k/jnethack_1.1.5-11woody2_m68k.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-ia64/jnethack_1.1.5-11woody2_ia64.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-hppa/jnethack_1.1.5-11woody2_hppa.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-arm/jnethack_1.1.5-11woody2_arm.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-alpha/jnethack_1.1.5-11woody2_alpha.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-i386/jnethack_1.1.5-11woody2_i386.deb
stable/main/source/jnethack_1.1.5-11woody2.dsc
stable/main/source/jnethack_1.1.5-11woody2.diff.gz
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-sparc/jigdo-file_0.6.5-2_sparc.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-s390/jigdo-file_0.6.5-2_s390.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-powerpc/jigdo-file_0.6.5-2_powerpc.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-mipsel/jigdo-file_0.6.5-2_mipsel.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-mips/jigdo-file_0.6.5-2_mips.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-m68k/jigdo-file_0.6.5-2_m68k.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-ia64/jigdo-file_0.6.5-2_ia64.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-hppa/jigdo-file_0.6.5-2_hppa.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-arm/jigdo-file_0.6.5-2_arm.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-alpha/jigdo-file_0.6.5-2_alpha.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/source/jigdo_0.6.5-2.dsc
stable/main/source/jigdo_0.6.5-2.diff.gz
stable/main/binary-i386/jigdo-file_0.6.5-2_i386.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-s390/bitchx-gtk_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx-ssl_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx-dev_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx_1.0-0c19-1.1_s390.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-powerpc/bitchx-gtk_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx-ssl_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx-dev_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx_1.0-0c19-1.1_powerpc.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-mipsel/bitchx-dev_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx-gtk_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx-ssl_1.0-0c19-1.1_mipsel.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-mips/bitchx-gtk_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx-dev_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx-ssl_1.0-0c19-1.1_mips.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-m68k/bitchx_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-gtk_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-ssl_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-dev_1.0-0c19-1.1_m68k.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-ia64/bitchx_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-ssl_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-dev_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-gtk_1.0-0c19-1.1_ia64.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-i386/bitchx-ssl_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx-dev_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx-gtk_1.0-0c19-1.1_i386.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-hppa/bitchx-gtk_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx-dev_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx-ssl_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx_1.0-0c19-1.1_hppa.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-arm/bitchx_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-ssl_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-dev_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-gtk_1.0-0c19-1.1_arm.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-alpha/bitchx-ssl_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx-gtk_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx-dev_1.0-0c19-1.1_alpha.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-sparc/bitchx-ssl_1.0-0c19-1.1_sparc.deb
stable/main/source/ircii-pana_1.0-0c19-1.1.diff.gz
stable/main/binary-sparc/bitchx-gtk_1.0-0c19-1.1_sparc.deb
stable/main/binary-sparc/bitchx-dev_1.0-0c19-1.1_sparc.deb
stable/main/source/ircii-pana_1.0-0c19-1.1.dsc
stable/main/binary-sparc/bitchx_1.0-0c19-1.1_sparc.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-all/ipmasq_3.5.10c_all.deb
stable/main/source/ipmasq_3.5.10c.dsc
stable/main/source/ipmasq_3.5.10c.tar.gz
ipmasq (3.5.10c) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Note that the issue fixed in 3.5.10b is CAN-2003-0785


stable/main/binary-all/xfonts-intl-european_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-chinese_1.2.1-0.woody.1_all.deb
stable/main/source/intlfonts_1.2.1-0.woody.1.diff.gz
stable/main/binary-all/xfonts-intl-asian_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-phonetic_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-japanese_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-arabic_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-chinese-big_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-japanese-big_1.2.1-0.woody.1_all.deb
stable/main/source/intlfonts_1.2.1-0.woody.1.dsc
intlfonts (1.2.1-0.woody.1) stable; urgency=high
  * New upstream release, backported to woody.  It fixes the licensing
    problem with Japanese big fonts that we are not allowed to distribute.


stable/main/source/imp_2.2.6-5.2.dsc
stable/main/source/imp_2.2.6-5.2.diff.gz
stable/main/binary-all/imp_2.2.6-5.2_all.deb
imp (3:2.2.6-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Small correction for db.pgsql


stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/imagemagick_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/perlmagick_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick5_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody1_sparc.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick++5_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick5_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/perlmagick_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/imagemagick_5.4.4.5-1woody1_s390.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody1_powerpc.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody1_mipsel.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick5_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/perlmagick_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/imagemagick_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick++5_5.4.4.5-1woody1_mips.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-m68k/imagemagick_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick5_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/perlmagick_5.4.4.5-1woody1_m68k.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/imagemagick_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/perlmagick_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick5_5.4.4.5-1woody1_ia64.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-hppa/perlmagick_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick5_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/imagemagick_5.4.4.5-1woody1_hppa.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick5_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/perlmagick_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick++5_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/imagemagick_5.4.4.5-1woody1_arm.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/perlmagick_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/imagemagick_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick5_5.4.4.5-1woody1_alpha.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/source/imagemagick_5.4.4.5-1woody1.diff.gz
stable/main/binary-i386/perlmagick_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick++5_5.4.4.5-1woody1_i386.deb
stable/main/source/imagemagick_5.4.4.5-1woody1.dsc
stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick5_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/imagemagick_5.4.4.5-1woody1_i386.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-ia64/illuminator-demo_0.3.2-1.woody.2_ia64.deb
stable/main/binary-ia64/illuminator0_0.3.2-1.woody.2_ia64.deb
stable/main/binary-ia64/illuminator-dev_0.3.2-1.woody.2_ia64.deb
illuminator (0.3.2-1.woody.2) testing; urgency=low
  * D'OH!  Forgot to set the distribution to "testing" before upload...


stable/main/binary-s390/hypermail_2.1.3-2.0_s390.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-powerpc/hypermail_2.1.3-2.0_powerpc.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-mipsel/hypermail_2.1.3-2.0_mipsel.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-mips/hypermail_2.1.3-2.0_mips.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-m68k/hypermail_2.1.3-2.0_m68k.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-ia64/hypermail_2.1.3-2.0_ia64.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-i386/hypermail_2.1.3-2.0_i386.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-hppa/hypermail_2.1.3-2.0_hppa.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-arm/hypermail_2.1.3-2.0_arm.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-alpha/hypermail_2.1.3-2.0_alpha.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-sparc/hypermail_2.1.3-2.0_sparc.deb
stable/main/source/hypermail_2.1.3-2.0.dsc
stable/main/source/hypermail_2.1.3-2.0.diff.gz
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-sparc/hylafax-client_4.1.1-3_sparc.deb
stable/main/binary-sparc/hylafax-server_4.1.1-3_sparc.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-s390/hylafax-server_4.1.1-3_s390.deb
stable/main/binary-s390/hylafax-client_4.1.1-3_s390.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-m68k/hylafax-client_4.1.1-3_m68k.deb
stable/main/binary-m68k/hylafax-server_4.1.1-3_m68k.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-ia64/hylafax-server_4.1.1-3_ia64.deb
stable/main/binary-ia64/hylafax-client_4.1.1-3_ia64.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-i386/hylafax-client_4.1.1-3_i386.deb
stable/main/binary-i386/hylafax-server_4.1.1-3_i386.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-hppa/hylafax-server_4.1.1-3_hppa.deb
stable/main/binary-hppa/hylafax-client_4.1.1-3_hppa.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-arm/hylafax-server_4.1.1-3_arm.deb
stable/main/binary-arm/hylafax-client_4.1.1-3_arm.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-alpha/hylafax-server_4.1.1-3_alpha.deb
stable/main/binary-alpha/hylafax-client_4.1.1-3_alpha.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/source/hylafax_4.1.1-3.dsc
stable/main/binary-powerpc/hylafax-server_4.1.1-3_powerpc.deb
stable/main/binary-all/hylafax-doc_4.1.1-3_all.deb
stable/main/binary-powerpc/hylafax-client_4.1.1-3_powerpc.deb
stable/main/source/hylafax_4.1.1-3.diff.gz
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-sparc/gzip_1.3.2-3woody1_sparc.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-s390/gzip_1.3.2-3woody1_s390.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-powerpc/gzip_1.3.2-3woody1_powerpc.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-mipsel/gzip_1.3.2-3woody1_mipsel.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-mips/gzip_1.3.2-3woody1_mips.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-m68k/gzip_1.3.2-3woody1_m68k.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-ia64/gzip_1.3.2-3woody1_ia64.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-hppa/gzip_1.3.2-3woody1_hppa.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-arm/gzip_1.3.2-3woody1_arm.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-alpha/gzip_1.3.2-3woody1_alpha.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/source/gzip_1.3.2-3woody1.dsc
stable/main/source/gzip_1.3.2-3woody1.diff.gz
stable/main/binary-i386/gzip_1.3.2-3woody1_i386.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/source/gs-common_0.3.3.0woody1.tar.gz
stable/main/binary-all/gs-common_0.3.3.0woody1_all.deb
stable/main/source/gs-common_0.3.3.0woody1.dsc
gs-common (0.3.3.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch ps2epsi to create a temporary file securely using tempfile


stable/main/binary-sparc/gopher_3.0.3woody1_sparc.deb
stable/main/binary-sparc/gopherd_3.0.3woody1_sparc.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-s390/gopher_3.0.3woody1_s390.deb
stable/main/binary-s390/gopherd_3.0.3woody1_s390.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-powerpc/gopher_3.0.3woody1_powerpc.deb
stable/main/binary-powerpc/gopherd_3.0.3woody1_powerpc.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-mipsel/gopherd_3.0.3woody1_mipsel.deb
stable/main/binary-mipsel/gopher_3.0.3woody1_mipsel.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-mips/gopher_3.0.3woody1_mips.deb
stable/main/binary-mips/gopherd_3.0.3woody1_mips.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-m68k/gopherd_3.0.3woody1_m68k.deb
stable/main/binary-m68k/gopher_3.0.3woody1_m68k.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-ia64/gopherd_3.0.3woody1_ia64.deb
stable/main/binary-ia64/gopher_3.0.3woody1_ia64.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-hppa/gopher_3.0.3woody1_hppa.deb
stable/main/binary-hppa/gopherd_3.0.3woody1_hppa.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-arm/gopherd_3.0.3woody1_arm.deb
stable/main/binary-arm/gopher_3.0.3woody1_arm.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-alpha/gopherd_3.0.3woody1_alpha.deb
stable/main/binary-alpha/gopher_3.0.3woody1_alpha.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/source/gopher_3.0.3woody1.dsc
stable/main/source/gopher_3.0.3woody1.tar.gz
stable/main/binary-i386/gopherd_3.0.3woody1_i386.deb
stable/main/binary-i386/gopher_3.0.3woody1_i386.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-sparc/gnupg_1.0.6-4_sparc.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-s390/gnupg_1.0.6-4_s390.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-powerpc/gnupg_1.0.6-4_powerpc.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-mipsel/gnupg_1.0.6-4_mipsel.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-mips/gnupg_1.0.6-4_mips.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-m68k/gnupg_1.0.6-4_m68k.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-ia64/gnupg_1.0.6-4_ia64.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-hppa/gnupg_1.0.6-4_hppa.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-arm/gnupg_1.0.6-4_arm.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-alpha/gnupg_1.0.6-4_alpha.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/source/gnupg_1.0.6-4.dsc
stable/main/binary-i386/gnupg_1.0.6-4_i386.deb
stable/main/source/gnupg_1.0.6-4.diff.gz
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-sparc/gnocatan-server_0.6.1-5woody2_sparc.deb
stable/main/binary-sparc/gnocatan-client_0.6.1-5woody2_sparc.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-s390/gnocatan-server_0.6.1-5woody2_s390.deb
stable/main/binary-s390/gnocatan-client_0.6.1-5woody2_s390.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-powerpc/gnocatan-server_0.6.1-5woody2_powerpc.deb
stable/main/binary-powerpc/gnocatan-client_0.6.1-5woody2_powerpc.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-mipsel/gnocatan-client_0.6.1-5woody2_mipsel.deb
stable/main/binary-mipsel/gnocatan-server_0.6.1-5woody2_mipsel.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-mips/gnocatan-server_0.6.1-5woody2_mips.deb
stable/main/binary-mips/gnocatan-client_0.6.1-5woody2_mips.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-m68k/gnocatan-server_0.6.1-5woody2_m68k.deb
stable/main/binary-m68k/gnocatan-client_0.6.1-5woody2_m68k.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-ia64/gnocatan-client_0.6.1-5woody2_ia64.deb
stable/main/binary-ia64/gnocatan-server_0.6.1-5woody2_ia64.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-arm/gnocatan-server_0.6.1-5woody2_arm.deb
stable/main/binary-arm/gnocatan-client_0.6.1-5woody2_arm.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-alpha/gnocatan-server_0.6.1-5woody2_alpha.deb
stable/main/binary-alpha/gnocatan-client_0.6.1-5woody2_alpha.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-i386/gnocatan-client_0.6.1-5woody2_i386.deb
stable/main/source/gnocatan_0.6.1-5woody2.dsc
stable/main/binary-all/gnocatan-help_0.6.1-5woody2_all.deb
stable/main/binary-all/gnocatan-data_0.6.1-5woody2_all.deb
stable/main/source/gnocatan_0.6.1-5woody2.diff.gz
stable/main/binary-i386/gnocatan-server_0.6.1-5woody2_i386.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-sparc/libc6-sparc64_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-prof_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dev_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-pic_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dbg_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/nscd_2.2.5-11.5_sparc.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-s390/libc6-pic_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-dbg_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-prof_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6_2.2.5-11.5_s390.deb
stable/main/binary-s390/nscd_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-dev_2.2.5-11.5_s390.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-powerpc/libc6-dev_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-dbg_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/nscd_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-prof_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-pic_2.2.5-11.5_powerpc.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-mipsel/nscd_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-dev_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-prof_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-dbg_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-pic_2.2.5-11.5_mipsel.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-mips/nscd_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-dev_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-pic_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-prof_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-dbg_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6_2.2.5-11.5_mips.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-ia64/libc6.1-pic_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-dev_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-prof_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/nscd_2.2.5-11.5_ia64.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-i386/libc6-dbg_2.2.5-11.5_i386.deb
stable/main/binary-i386/nscd_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-pic_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-dev_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-prof_2.2.5-11.5_i386.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-hppa/libc6-prof_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-dbg_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-pic_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/nscd_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-dev_2.2.5-11.5_hppa.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-arm/libc6-prof_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-dev_2.2.5-11.5_arm.deb
stable/main/binary-arm/nscd_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-dbg_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-pic_2.2.5-11.5_arm.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-pic_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/nscd_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-prof_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-dev_2.2.5-11.5_alpha.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-m68k/libc6-dev_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-prof_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-pic_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-dbg_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/nscd_2.2.5-11.5_m68k.deb
stable/main/binary-all/locales_2.2.5-11.5_all.deb
stable/main/source/glibc_2.2.5-11.5.dsc
stable/main/source/glibc_2.2.5-11.5.diff.gz
stable/main/binary-all/glibc-doc_2.2.5-11.5_all.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/source/gallery_1.2.5-8woody1.dsc
stable/main/source/gallery_1.2.5-8woody1.diff.gz
stable/main/binary-all/gallery_1.2.5-8woody1_all.deb
gallery (1.2.5-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cross-site scripting in searchstring parameter
    (CAN-2003-0614)
    [search.php]


stable/main/binary-sparc/fuzz_0.6-6woody1_sparc.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-s390/fuzz_0.6-6woody1_s390.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-powerpc/fuzz_0.6-6woody1_powerpc.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-mipsel/fuzz_0.6-6woody1_mipsel.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-mips/fuzz_0.6-6woody1_mips.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-m68k/fuzz_0.6-6woody1_m68k.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-ia64/fuzz_0.6-6woody1_ia64.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-hppa/fuzz_0.6-6woody1_hppa.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-arm/fuzz_0.6-6woody1_arm.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-alpha/fuzz_0.6-6woody1_alpha.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/source/fuzz_0.6-6woody1.diff.gz
stable/main/source/fuzz_0.6-6woody1.dsc
stable/main/binary-i386/fuzz_0.6-6woody1_i386.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-alpha/ftape-util_1.09.2001.08.13-0.3_alpha.deb
ftape-tools (1:1.09.2001.08.13-0.3) unstable; urgency=low
  * Non-maintainer upload.
  * debian/control: Added `texinfo' to build dependencies.
    Closes: Bug#133562.


stable/main/binary-sparc/file_3.37-3.1.woody.1_sparc.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-s390/file_3.37-3.1.woody.1_s390.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-powerpc/file_3.37-3.1.woody.1_powerpc.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-mipsel/file_3.37-3.1.woody.1_mipsel.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-mips/file_3.37-3.1.woody.1_mips.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-m68k/file_3.37-3.1.woody.1_m68k.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-ia64/file_3.37-3.1.woody.1_ia64.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-i386/file_3.37-3.1.woody.1_i386.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-hppa/file_3.37-3.1.woody.1_hppa.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-arm/file_3.37-3.1.woody.1_arm.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-alpha/file_3.37-3.1.woody.1_alpha.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/source/file_3.37-3.1.woody.1.dsc
stable/main/source/file_3.37-3.1.woody.1.diff.gz
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-s390/fetchmail-ssl_5.9.11-6.2_s390.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.2_powerpc.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.2_mipsel.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mips/fetchmail-ssl_5.9.11-6.2_mips.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.2_m68k.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.2_ia64.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-i386/fetchmail-ssl_5.9.11-6.2_i386.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.2_hppa.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-arm/fetchmail-ssl_5.9.11-6.2_arm.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.2_alpha.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.2_sparc.deb
stable/main/source/fetchmail-ssl_5.9.11-6.2.dsc
stable/main/source/fetchmail-ssl_5.9.11-6.2.diff.gz
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-s390/fetchmail_5.9.11-6.2_s390.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-powerpc/fetchmail_5.9.11-6.2_powerpc.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mipsel/fetchmail_5.9.11-6.2_mipsel.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mips/fetchmail_5.9.11-6.2_mips.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-m68k/fetchmail_5.9.11-6.2_m68k.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-ia64/fetchmail_5.9.11-6.2_ia64.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-i386/fetchmail_5.9.11-6.2_i386.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-hppa/fetchmail_5.9.11-6.2_hppa.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-arm/fetchmail_5.9.11-6.2_arm.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-alpha/fetchmail_5.9.11-6.2_alpha.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/source/fetchmail_5.9.11-6.2.diff.gz
stable/main/binary-all/fetchmailconf_5.9.11-6.2_all.deb
stable/main/binary-sparc/fetchmail_5.9.11-6.2_sparc.deb
stable/main/binary-all/fetchmail-common_5.9.11-6.2_all.deb
stable/main/source/fetchmail_5.9.11-6.2.dsc
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-sparc/fdclone_2.00a-1woody3_sparc.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-s390/fdclone_2.00a-1woody3_s390.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-powerpc/fdclone_2.00a-1woody3_powerpc.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-m68k/fdclone_2.00a-1woody3_m68k.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-hppa/fdclone_2.00a-1woody3_hppa.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-arm/fdclone_2.00a-1woody3_arm.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-alpha/fdclone_2.00a-1woody3_alpha.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/source/fdclone_2.00a-1woody3.dsc
stable/main/binary-i386/fdclone_2.00a-1woody3_i386.deb
stable/main/source/fdclone_2.00a-1woody3.diff.gz
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-sparc/falconseye_1.9.3-7woody3_sparc.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-s390/falconseye_1.9.3-7woody3_s390.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-powerpc/falconseye_1.9.3-7woody3_powerpc.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-mipsel/falconseye_1.9.3-7woody3_mipsel.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-mips/falconseye_1.9.3-7woody3_mips.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-m68k/falconseye_1.9.3-7woody3_m68k.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-ia64/falconseye_1.9.3-7woody3_ia64.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-hppa/falconseye_1.9.3-7woody3_hppa.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-arm/falconseye_1.9.3-7woody3_arm.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-alpha/falconseye_1.9.3-7woody3_alpha.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/source/falconseye_1.9.3-7woody3.dsc
stable/main/binary-i386/falconseye_1.9.3-7woody3_i386.deb
stable/main/binary-all/falconseye-data_1.9.3-7woody3_all.deb
stable/main/source/falconseye_1.9.3-7woody3.diff.gz
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-sparc/eximon_3.35-1woody2_sparc.deb
stable/main/binary-sparc/exim_3.35-1woody2_sparc.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-s390/eximon_3.35-1woody2_s390.deb
stable/main/binary-s390/exim_3.35-1woody2_s390.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-powerpc/eximon_3.35-1woody2_powerpc.deb
stable/main/binary-powerpc/exim_3.35-1woody2_powerpc.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-mipsel/exim_3.35-1woody2_mipsel.deb
stable/main/binary-mipsel/eximon_3.35-1woody2_mipsel.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-mips/eximon_3.35-1woody2_mips.deb
stable/main/binary-mips/exim_3.35-1woody2_mips.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-m68k/exim_3.35-1woody2_m68k.deb
stable/main/binary-m68k/eximon_3.35-1woody2_m68k.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-ia64/exim_3.35-1woody2_ia64.deb
stable/main/binary-ia64/eximon_3.35-1woody2_ia64.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-hppa/eximon_3.35-1woody2_hppa.deb
stable/main/binary-hppa/exim_3.35-1woody2_hppa.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-arm/exim_3.35-1woody2_arm.deb
stable/main/binary-arm/eximon_3.35-1woody2_arm.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-alpha/exim_3.35-1woody2_alpha.deb
stable/main/binary-alpha/eximon_3.35-1woody2_alpha.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/source/exim_3.35-1woody2.diff.gz
stable/main/binary-i386/exim_3.35-1woody2_i386.deb
stable/main/binary-i386/eximon_3.35-1woody2_i386.deb
stable/main/source/exim_3.35-1woody2.dsc
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-sparc/ethereal-dev_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/ethereal_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/tethereal_0.9.4-1woody5_sparc.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-s390/tethereal_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal-common_0.9.4-1woody5_s390.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/ethereal_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody5_powerpc.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-mipsel/tethereal_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal-common_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody5_mipsel.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-mips/ethereal-dev_0.9.4-1woody5_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody5_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody5_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody5_mips.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-m68k/ethereal_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/ethereal-dev_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody5_m68k.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-ia64/tethereal_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody5_ia64.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-hppa/ethereal-dev_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/ethereal-common_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody5_hppa.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-arm/ethereal-common_0.9.4-1woody5_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody5_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody5_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody5_arm.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-alpha/tethereal_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal-dev_0.9.4-1woody5_alpha.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-i386/ethereal-common_0.9.4-1woody5_i386.deb
stable/main/source/ethereal_0.9.4-1woody5.diff.gz
stable/main/binary-i386/ethereal_0.9.4-1woody5_i386.deb
stable/main/source/ethereal_0.9.4-1woody5.dsc
stable/main/binary-i386/tethereal_0.9.4-1woody5_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody5_i386.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.2_sparc.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-s390/eterm_0.9.2-0pre2002042903.2_s390.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.2_powerpc.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.2_mipsel.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-mips/eterm_0.9.2-0pre2002042903.2_mips.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.2_m68k.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.2_ia64.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.2_hppa.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-arm/eterm_0.9.2-0pre2002042903.2_arm.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.2_alpha.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/source/eterm_0.9.2-0pre2002042903.2.tar.gz
stable/main/source/eterm_0.9.2-0pre2002042903.2.dsc
stable/main/binary-i386/eterm_0.9.2-0pre2002042903.2_i386.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-all/eroaster_2.1.0.0.3-2woody1_all.deb
stable/main/source/eroaster_2.1.0.0.3-2woody1.dsc
stable/main/source/eroaster_2.1.0.0.3-2woody1.diff.gz
eroaster (2.1.0.0.3-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to use a temporary file under $HOME, rather than in
    /tmp (CAN-2003-0656)


stable/main/binary-sparc/epic4_1.1.2.20020219-2.2_sparc.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-s390/epic4_1.1.2.20020219-2.2_s390.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-powerpc/epic4_1.1.2.20020219-2.2_powerpc.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-mipsel/epic4_1.1.2.20020219-2.2_mipsel.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-mips/epic4_1.1.2.20020219-2.2_mips.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-m68k/epic4_1.1.2.20020219-2.2_m68k.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-ia64/epic4_1.1.2.20020219-2.2_ia64.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-i386/epic4_1.1.2.20020219-2.2_i386.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-hppa/epic4_1.1.2.20020219-2.2_hppa.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-arm/epic4_1.1.2.20020219-2.2_arm.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-alpha/epic4_1.1.2.20020219-2.2_alpha.deb
stable/main/source/epic4_1.1.2.20020219-2.2.dsc
stable/main/source/epic4_1.1.2.20020219-2.2.diff.gz
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-s390/epic_3.004-17.1_s390.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-powerpc/epic_3.004-17.1_powerpc.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-mipsel/epic_3.004-17.1_mipsel.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-mips/epic_3.004-17.1_mips.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-m68k/epic_3.004-17.1_m68k.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-ia64/epic_3.004-17.1_ia64.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-i386/epic_3.004-17.1_i386.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-hppa/epic_3.004-17.1_hppa.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-arm/epic_3.004-17.1_arm.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-alpha/epic_3.004-17.1_alpha.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-sparc/epic_3.004-17.1_sparc.deb
stable/main/source/epic_3.004-17.1.dsc
stable/main/source/epic_3.004-17.1.diff.gz
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/source/eldav_0.0.20020411-1woody1.diff.gz
stable/main/binary-all/eldav_0.0.20020411-1woody1_all.deb
stable/main/source/eldav_0.0.20020411-1woody1.dsc
eldav (0.0.20020411-1woody1) stable-security; urgency=high
  * fix insecure tempfile handling (CAN-2003-0438)
  * backport make-temp-file from apel-10.5/poe.el


stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_s390.deb
stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.1_s390.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_powerpc.deb
stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.1_powerpc.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.1_mipsel.deb
stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mipsel.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.1_mips.deb
stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mips.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_m68k.deb
stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.1_m68k.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.1_ia64.deb
stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_ia64.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_i386.deb
stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.1_i386.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_hppa.deb
stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.1_hppa.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_arm.deb
stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.1_arm.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_alpha.deb
stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.1_alpha.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.diff.gz
stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.1_sparc.deb
stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.dsc
stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_sparc.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-arm/dwww_1.7.6.woody.1_arm.deb
stable/main/binary-arm/realpath_1.7.6.woody.1_arm.deb
dwww (1.7.6.woody.1) woody-proposed-updates; urgency=low
  * Upload to woody, no changes in source.
    The current dwww version in woody is 1.7.4, but I'd like to see 1.7.6
    there: it has fixed a few of bugs and no new bug has been reported
    for 6 weeks. So it really is worth including in woody, I think.


stable/main/binary-powerpc/dietlibc-dev_0.12-2.5_powerpc.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-mipsel/dietlibc-dev_0.12-2.5_mipsel.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-mips/dietlibc-dev_0.12-2.5_mips.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-i386/dietlibc-dev_0.12-2.5_i386.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-arm/dietlibc-dev_0.12-2.5_arm.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-alpha/dietlibc-dev_0.12-2.5_alpha.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/source/dietlibc_0.12-2.5.diff.gz
stable/main/binary-sparc/dietlibc-dev_0.12-2.5_sparc.deb
stable/main/binary-all/dietlibc-doc_0.12-2.5_all.deb
stable/main/source/dietlibc_0.12-2.5.dsc
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-s390/dhcp3-dev_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-server_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-relay_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-common_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-client_3.0+3.0.1rc9-2.2_s390.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-powerpc/dhcp3-common_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-client_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-relay_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-server_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-dev_3.0+3.0.1rc9-2.2_powerpc.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-mipsel/dhcp3-dev_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-server_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-relay_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-common_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-client_3.0+3.0.1rc9-2.2_mipsel.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-mips/dhcp3-common_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-relay_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-server_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-dev_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-client_3.0+3.0.1rc9-2.2_mips.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-m68k/dhcp3-server_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-relay_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-common_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-client_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-dev_3.0+3.0.1rc9-2.2_m68k.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-ia64/dhcp3-dev_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-client_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-relay_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-common_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-server_3.0+3.0.1rc9-2.2_ia64.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-i386/dhcp3-client_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-dev_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-server_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-relay_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-common_3.0+3.0.1rc9-2.2_i386.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-hppa/dhcp3-dev_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-server_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-relay_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-common_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-client_3.0+3.0.1rc9-2.2_hppa.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-arm/dhcp3-server_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-dev_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-relay_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-client_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-common_3.0+3.0.1rc9-2.2_arm.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-alpha/dhcp3-server_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-relay_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-client_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-dev_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-common_3.0+3.0.1rc9-2.2_alpha.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-sparc/dhcp3-relay_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.dsc
stable/main/binary-sparc/dhcp3-server_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.diff.gz
stable/main/binary-sparc/dhcp3-common_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/binary-sparc/dhcp3-dev_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/binary-sparc/dhcp3-client_3.0+3.0.1rc9-2.2_sparc.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-sparc/debianutils_1.16.2woody1_sparc.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-s390/debianutils_1.16.2woody1_s390.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-powerpc/debianutils_1.16.2woody1_powerpc.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-mipsel/debianutils_1.16.2woody1_mipsel.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-mips/debianutils_1.16.2woody1_mips.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-m68k/debianutils_1.16.2woody1_m68k.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-ia64/debianutils_1.16.2woody1_ia64.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-i386/debianutils_1.16.2woody1_i386.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-hppa/debianutils_1.16.2woody1_hppa.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-arm/debianutils_1.16.2woody1_arm.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-alpha/debianutils_1.16.2woody1_alpha.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/source/debianutils_1.16.2woody1.tar.gz
stable/main/source/debianutils_1.16.2woody1.dsc
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/source/ddskk_11.6.rel.0-2woody1.dsc
stable/main/source/ddskk_11.6.rel.0-2woody1.diff.gz
stable/main/binary-all/ddskk_11.6.rel.0-2woody1_all.deb
ddskk (11.6.rel.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/dbishell_0.8.9-2woody1_all.deb
stable/main/source/dbishell_0.8.9-2woody1.diff.gz
stable/main/source/dbishell_0.8.9-2woody1.dsc
dbishell (0.8.9-2woody1) stable; urgency=low
  * work around xterm feature disabled in DSA 380-1 that we used.
    Without this change, we lose the ability to run inside xterms
    after DSA 380-1 is dealt with on a system.


stable/main/binary-s390/cyrus-common_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-pop3d_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-admin_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-imapd_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-nntp_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-dev_1.5.19-9.1_s390.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-powerpc/cyrus-dev_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-common_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-admin_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.1_powerpc.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-admin_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-dev_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-common_1.5.19-9.1_mipsel.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-mips/cyrus-pop3d_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-dev_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-admin_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-imapd_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-common_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-nntp_1.5.19-9.1_mips.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-m68k/cyrus-imapd_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-nntp_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-dev_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-admin_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-common_1.5.19-9.1_m68k.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-ia64/cyrus-common_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-admin_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-dev_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-imapd_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-nntp_1.5.19-9.1_ia64.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-i386/cyrus-nntp_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-common_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-dev_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-admin_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-pop3d_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-imapd_1.5.19-9.1_i386.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-common_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-imapd_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-admin_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-nntp_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-dev_1.5.19-9.1_hppa.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-arm/cyrus-nntp_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-common_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-dev_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-imapd_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-admin_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-pop3d_1.5.19-9.1_arm.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-alpha/cyrus-admin_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-imapd_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-common_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-dev_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-nntp_1.5.19-9.1_alpha.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-sparc/cyrus-nntp_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-admin_1.5.19-9.1_sparc.deb
stable/main/source/cyrus-imapd_1.5.19-9.1.diff.gz
stable/main/binary-sparc/cyrus-dev_1.5.19-9.1_sparc.deb
stable/main/source/cyrus-imapd_1.5.19-9.1.dsc
stable/main/binary-sparc/cyrus-common_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-imapd_1.5.19-9.1_sparc.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-s390/cvs_1.11.1p1debian-8.1_s390.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-powerpc/cvs_1.11.1p1debian-8.1_powerpc.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-mipsel/cvs_1.11.1p1debian-8.1_mipsel.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-mips/cvs_1.11.1p1debian-8.1_mips.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-m68k/cvs_1.11.1p1debian-8.1_m68k.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-ia64/cvs_1.11.1p1debian-8.1_ia64.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-i386/cvs_1.11.1p1debian-8.1_i386.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-hppa/cvs_1.11.1p1debian-8.1_hppa.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-arm/cvs_1.11.1p1debian-8.1_arm.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-alpha/cvs_1.11.1p1debian-8.1_alpha.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/source/cvs_1.11.1p1debian-8.1.diff.gz
stable/main/binary-sparc/cvs_1.11.1p1debian-8.1_sparc.deb
stable/main/source/cvs_1.11.1p1debian-8.1.dsc
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5_sparc.deb
stable/main/binary-sparc/libcupsys2-dev_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys-client_1.1.14-5_sparc.deb
stable/main/binary-sparc/libcupsys2_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys-bsd_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys_1.1.14-5_sparc.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-s390/cupsys-pstoraster_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys-client_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys-bsd_1.1.14-5_s390.deb
stable/main/binary-s390/libcupsys2_1.1.14-5_s390.deb
stable/main/binary-s390/libcupsys2-dev_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys_1.1.14-5_s390.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-powerpc/libcupsys2_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-bsd_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-client_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys_1.1.14-5_powerpc.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-mipsel/cupsys-bsd_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys-client_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/libcupsys2_1.1.14-5_mipsel.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-mips/cupsys-pstoraster_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys-bsd_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys-client_1.1.14-5_mips.deb
stable/main/binary-mips/libcupsys2-dev_1.1.14-5_mips.deb
stable/main/binary-mips/libcupsys2_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys_1.1.14-5_mips.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-m68k/cupsys-client_1.1.14-5_m68k.deb
stable/main/binary-m68k/libcupsys2_1.1.14-5_m68k.deb
stable/main/binary-m68k/libcupsys2-dev_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys-bsd_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys_1.1.14-5_m68k.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys-client_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys-bsd_1.1.14-5_ia64.deb
stable/main/binary-ia64/libcupsys2-dev_1.1.14-5_ia64.deb
stable/main/binary-ia64/libcupsys2_1.1.14-5_ia64.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-hppa/libcupsys2_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-client_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-bsd_1.1.14-5_hppa.deb
stable/main/binary-hppa/libcupsys2-dev_1.1.14-5_hppa.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-arm/libcupsys2_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-client_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-bsd_1.1.14-5_arm.deb
stable/main/binary-arm/libcupsys2-dev_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-pstoraster_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys_1.1.14-5_arm.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-alpha/libcupsys2-dev_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-bsd_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-client_1.1.14-5_alpha.deb
stable/main/binary-alpha/libcupsys2_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys_1.1.14-5_alpha.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/source/cupsys_1.1.14-5.diff.gz
stable/main/binary-i386/cupsys-bsd_1.1.14-5_i386.deb
stable/main/binary-i386/cupsys_1.1.14-5_i386.deb
stable/main/binary-i386/libcupsys2-dev_1.1.14-5_i386.deb
stable/main/binary-i386/cupsys-client_1.1.14-5_i386.deb
stable/main/source/cupsys_1.1.14-5.dsc
stable/main/binary-i386/cupsys-pstoraster_1.1.14-5_i386.deb
stable/main/binary-i386/libcupsys2_1.1.14-5_i386.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/source/console-data_1999.08.29-24.2.diff.gz
stable/main/binary-all/console-data_1999.08.29-24.2_all.deb
stable/main/source/console-data_1999.08.29-24.2.dsc
console-data (1999.08.29-24.2) stable; urgency=low
  * Fix depends to work properly on woody. Closes: #201659.
  * Change maintainer.


stable/main/binary-sparc/colrconv_0.99.2-8_sparc.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-s390/colrconv_0.99.2-8_s390.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-powerpc/colrconv_0.99.2-8_powerpc.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-mipsel/colrconv_0.99.2-8_mipsel.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-mips/colrconv_0.99.2-8_mips.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-m68k/colrconv_0.99.2-8_m68k.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-ia64/colrconv_0.99.2-8_ia64.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-hppa/colrconv_0.99.2-8_hppa.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-arm/colrconv_0.99.2-8_arm.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-s390/canna-utils_3.5b2-46.2_s390.deb
stable/main/binary-s390/canna_3.5b2-46.2_s390.deb
stable/main/binary-s390/libcanna1g_3.5b2-46.2_s390.deb
stable/main/binary-s390/libcanna1g-dev_3.5b2-46.2_s390.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-powerpc/canna_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/libcanna1g-dev_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/canna-utils_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/libcanna1g_3.5b2-46.2_powerpc.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-mipsel/libcanna1g-dev_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/canna_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/canna-utils_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/libcanna1g_3.5b2-46.2_mipsel.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-mips/libcanna1g_3.5b2-46.2_mips.deb
stable/main/binary-mips/libcanna1g-dev_3.5b2-46.2_mips.deb
stable/main/binary-mips/canna-utils_3.5b2-46.2_mips.deb
stable/main/binary-mips/canna_3.5b2-46.2_mips.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-m68k/libcanna1g_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/libcanna1g-dev_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/canna_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/canna-utils_3.5b2-46.2_m68k.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-ia64/libcanna1g-dev_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/canna_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/canna-utils_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/libcanna1g_3.5b2-46.2_ia64.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-i386/canna_3.5b2-46.2_i386.deb
stable/main/binary-i386/canna-utils_3.5b2-46.2_i386.deb
stable/main/binary-i386/libcanna1g_3.5b2-46.2_i386.deb
stable/main/binary-i386/libcanna1g-dev_3.5b2-46.2_i386.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-hppa/libcanna1g-dev_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/libcanna1g_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/canna-utils_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/canna_3.5b2-46.2_hppa.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-arm/canna_3.5b2-46.2_arm.deb
stable/main/binary-arm/canna-utils_3.5b2-46.2_arm.deb
stable/main/binary-arm/libcanna1g-dev_3.5b2-46.2_arm.deb
stable/main/binary-arm/libcanna1g_3.5b2-46.2_arm.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-alpha/libcanna1g_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/canna-utils_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/canna_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/libcanna1g-dev_3.5b2-46.2_alpha.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-sparc/libcanna1g-dev_3.5b2-46.2_sparc.deb
stable/main/binary-sparc/canna-utils_3.5b2-46.2_sparc.deb
stable/main/binary-sparc/canna_3.5b2-46.2_sparc.deb
stable/main/source/canna_3.5b2-46.2.diff.gz
stable/main/binary-sparc/libcanna1g_3.5b2-46.2_sparc.deb
stable/main/source/canna_3.5b2-46.2.dsc
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/source/bugzilla_2.14.2-0woody4.diff.gz
stable/main/source/bugzilla_2.14.2-0woody4.dsc
stable/main/binary-all/bugzilla-doc_2.14.2-0woody4_all.deb
stable/main/binary-all/bugzilla_2.14.2-0woody4_all.deb
bugzilla (2.14.2-0woody4) stable-security; urgency=low
  * Non-maintainer upload by the security team
  * Apply upstream's fixes for two security bugs
    - collectstats.pl setting world-writable permissions
      http://bugzilla.mozilla.org/show_bug.cgi?id=183188
    - Checksetup leaves editor backups of localconfig accessible
      http://bugzilla.mozilla.org/show_bug.cgi?id=186383


stable/main/binary-sparc/bind-dev_8.3.3-2.0woody1_sparc.deb
stable/main/binary-sparc/bind_8.3.3-2.0woody1_sparc.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-s390/bind_8.3.3-2.0woody1_s390.deb
stable/main/binary-s390/bind-dev_8.3.3-2.0woody1_s390.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody1_powerpc.deb
stable/main/binary-powerpc/bind_8.3.3-2.0woody1_powerpc.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-mipsel/bind_8.3.3-2.0woody1_mipsel.deb
stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody1_mipsel.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-mips/bind_8.3.3-2.0woody1_mips.deb
stable/main/binary-mips/bind-dev_8.3.3-2.0woody1_mips.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-m68k/bind-dev_8.3.3-2.0woody1_m68k.deb
stable/main/binary-m68k/bind_8.3.3-2.0woody1_m68k.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-ia64/bind_8.3.3-2.0woody1_ia64.deb
stable/main/binary-ia64/bind-dev_8.3.3-2.0woody1_ia64.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-hppa/bind_8.3.3-2.0woody1_hppa.deb
stable/main/binary-hppa/bind-dev_8.3.3-2.0woody1_hppa.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-arm/bind_8.3.3-2.0woody1_arm.deb
stable/main/binary-arm/bind-dev_8.3.3-2.0woody1_arm.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-alpha/bind_8.3.3-2.0woody1_alpha.deb
stable/main/binary-alpha/bind-dev_8.3.3-2.0woody1_alpha.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/source/bind_8.3.3-2.0woody1.dsc
stable/main/binary-i386/bind_8.3.3-2.0woody1_i386.deb
stable/main/binary-i386/bind-dev_8.3.3-2.0woody1_i386.deb
stable/main/source/bind_8.3.3-2.0woody1.diff.gz
stable/main/binary-all/bind-doc_8.3.3-2.0woody1_all.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-sparc/balsa_1.2.4-2.2_sparc.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-s390/balsa_1.2.4-2.2_s390.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-powerpc/balsa_1.2.4-2.2_powerpc.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mipsel/balsa_1.2.4-2.2_mipsel.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mips/balsa_1.2.4-2.2_mips.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-m68k/balsa_1.2.4-2.2_m68k.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-ia64/balsa_1.2.4-2.2_ia64.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-i386/balsa_1.2.4-2.2_i386.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-hppa/balsa_1.2.4-2.2_hppa.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-arm/balsa_1.2.4-2.2_arm.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/source/balsa_1.2.4-2.2.diff.gz
stable/main/source/balsa_1.2.4-2.2.dsc
stable/main/binary-alpha/balsa_1.2.4-2.2_alpha.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/contrib/binary-sparc/autorespond_2.0.2-2woody1_sparc.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-s390/autorespond_2.0.2-2woody1_s390.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-powerpc/autorespond_2.0.2-2woody1_powerpc.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-mipsel/autorespond_2.0.2-2woody1_mipsel.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-mips/autorespond_2.0.2-2woody1_mips.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-m68k/autorespond_2.0.2-2woody1_m68k.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-ia64/autorespond_2.0.2-2woody1_ia64.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-hppa/autorespond_2.0.2-2woody1_hppa.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-arm/autorespond_2.0.2-2woody1_arm.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-alpha/autorespond_2.0.2-2woody1_alpha.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-i386/autorespond_2.0.2-2woody1_i386.deb
stable/contrib/source/autorespond_2.0.2-2woody1.dsc
stable/contrib/source/autorespond_2.0.2-2woody1.diff.gz
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/main/binary-sparc/atftp_0.6.0woody1_sparc.deb
stable/main/binary-sparc/atftpd_0.6.0woody1_sparc.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-s390/atftpd_0.6.0woody1_s390.deb
stable/main/binary-s390/atftp_0.6.0woody1_s390.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-powerpc/atftpd_0.6.0woody1_powerpc.deb
stable/main/binary-powerpc/atftp_0.6.0woody1_powerpc.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-mipsel/atftpd_0.6.0woody1_mipsel.deb
stable/main/binary-mipsel/atftp_0.6.0woody1_mipsel.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-mips/atftpd_0.6.0woody1_mips.deb
stable/main/binary-mips/atftp_0.6.0woody1_mips.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-m68k/atftp_0.6.0woody1_m68k.deb
stable/main/binary-m68k/atftpd_0.6.0woody1_m68k.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-ia64/atftpd_0.6.0woody1_ia64.deb
stable/main/binary-ia64/atftp_0.6.0woody1_ia64.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-hppa/atftpd_0.6.0woody1_hppa.deb
stable/main/binary-hppa/atftp_0.6.0woody1_hppa.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-arm/atftpd_0.6.0woody1_arm.deb
stable/main/binary-arm/atftp_0.6.0woody1_arm.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-alpha/atftpd_0.6.0woody1_alpha.deb
stable/main/binary-alpha/atftp_0.6.0woody1_alpha.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-i386/atftp_0.6.0woody1_i386.deb
stable/main/source/atftp_0.6.0woody1.dsc
stable/main/source/atftp_0.6.0woody1.tar.gz
stable/main/binary-i386/atftpd_0.6.0woody1_i386.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-s390/apcupsd_3.8.5-1.1.1_s390.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-powerpc/apcupsd_3.8.5-1.1.1_powerpc.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-mipsel/apcupsd_3.8.5-1.1.1_mipsel.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-mips/apcupsd_3.8.5-1.1.1_mips.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-m68k/apcupsd_3.8.5-1.1.1_m68k.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-ia64/apcupsd_3.8.5-1.1.1_ia64.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-i386/apcupsd_3.8.5-1.1.1_i386.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-hppa/apcupsd_3.8.5-1.1.1_hppa.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-arm/apcupsd_3.8.5-1.1.1_arm.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-alpha/apcupsd_3.8.5-1.1.1_alpha.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/source/apcupsd_3.8.5-1.1.1.diff.gz
stable/main/binary-sparc/apcupsd_3.8.5-1.1.1_sparc.deb
stable/main/source/apcupsd_3.8.5-1.1.1.dsc
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-sparc/acm_5.0-3.woody.1_sparc.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-s390/acm_5.0-3.woody.1_s390.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-powerpc/acm_5.0-3.woody.1_powerpc.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-mipsel/acm_5.0-3.woody.1_mipsel.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-mips/acm_5.0-3.woody.1_mips.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-m68k/acm_5.0-3.woody.1_m68k.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-ia64/acm_5.0-3.woody.1_ia64.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-hppa/acm_5.0-3.woody.1_hppa.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-arm/acm_5.0-3.woody.1_arm.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-alpha/acm_5.0-3.woody.1_alpha.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/source/acm_5.0-3.woody.1.diff.gz
stable/main/source/acm_5.0-3.woody.1.dsc
stable/main/binary-i386/acm_5.0-3.woody.1_i386.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


=========================================
Mon,  16 Dec 2002 - Debian 3.0r1a released
=========================================

No changes other than regenerated Packages files to include Task:
fields that were dropped in 3.0r1 due to a config SNAFU. :-(
	
=========================================
Sun,  15 Dec 2002 - Debian 3.0r1 released
=========================================

Removed the following packages from stable:

 cdrdao    | 1:1.1.5-3.1 | source, alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390
 gcdmaster | 1:1.1.5-3.1 | alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390
 (Reason: requested by Stable Release Manager)
   "Upstream reported: Due to license issues with the libedc_ecc
    library that is used by and distributed with cdrdao I have to
    temporarily freeze this project. All releases have been removed.

    See http://sourceforge.net/forum/forum.php?forum_id=213313
    See http://bugs.debian.org/162788"

 kernel-doc-2.2.20             |   2.2.20-5 | all
 kernel-headers-2.2.20	       |   2.2.20-4 | alpha
 kernel-image-2.2.20-alpha     |   2.2.20-4 | source
 kernel-image-2.2.20-generic   |   2.2.20-4 | alpha
 kernel-image-2.2.20-jensen    |   2.2.20-4 | alpha
 kernel-image-2.2.20-nautilus  |   2.2.20-4 | alpha
 kernel-image-2.2.20-smp       |   2.2.20-4 | alpha
 kernel-source-2.2.20	       |   2.2.20-5 | source, all
 pcmcia-modules-2.2.20	       | 3.1.33-6k5 | i386
 pcmcia-modules-2.2.20-compact | 3.1.33-6k5 | i386
 pcmcia-modules-2.2.20-idepci  | 3.1.33-6k5 | i386
 (Reason: requested by Stable Release Manager)
   "Superseded by 2.2.22."
	
----
	
stable/main/binary-sparc/yaclc_1.3.6.1_sparc.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-s390/yaclc_1.3.6.1_s390.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-powerpc/yaclc_1.3.6.1_powerpc.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-mipsel/yaclc_1.3.6.1_mipsel.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-mips/yaclc_1.3.6.1_mips.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-m68k/yaclc_1.3.6.1_m68k.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-ia64/yaclc_1.3.6.1_ia64.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-i386/yaclc_1.3.6.1_i386.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-hppa/yaclc_1.3.6.1_hppa.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-arm/yaclc_1.3.6.1_arm.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/source/yaclc_1.3.6.1.dsc
stable/main/binary-alpha/yaclc_1.3.6.1_alpha.deb
stable/main/source/yaclc_1.3.6.1.tar.gz
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-s390/xinetd_2.3.4-1.2_s390.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-powerpc/xinetd_2.3.4-1.2_powerpc.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-mipsel/xinetd_2.3.4-1.2_mipsel.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-mips/xinetd_2.3.4-1.2_mips.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-m68k/xinetd_2.3.4-1.2_m68k.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-ia64/xinetd_2.3.4-1.2_ia64.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-i386/xinetd_2.3.4-1.2_i386.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-hppa/xinetd_2.3.4-1.2_hppa.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-arm/xinetd_2.3.4-1.2_arm.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-alpha/xinetd_2.3.4-1.2_alpha.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-sparc/xinetd_2.3.4-1.2_sparc.deb
stable/main/source/xinetd_2.3.4-1.2.dsc
stable/main/source/xinetd_2.3.4-1.2.diff.gz
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-s390/wwwoffle_2.7a-1.2_s390.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-powerpc/wwwoffle_2.7a-1.2_powerpc.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-mipsel/wwwoffle_2.7a-1.2_mipsel.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-mips/wwwoffle_2.7a-1.2_mips.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-m68k/wwwoffle_2.7a-1.2_m68k.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-ia64/wwwoffle_2.7a-1.2_ia64.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-i386/wwwoffle_2.7a-1.2_i386.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-hppa/wwwoffle_2.7a-1.2_hppa.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-arm/wwwoffle_2.7a-1.2_arm.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-alpha/wwwoffle_2.7a-1.2_alpha.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/source/wwwoffle_2.7a-1.2.dsc
stable/main/source/wwwoffle_2.7a-1.2.diff.gz
stable/main/binary-sparc/wwwoffle_2.7a-1.2_sparc.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-sparc/weex_2.6.1-4woody1_sparc.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-s390/weex_2.6.1-4woody1_s390.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-powerpc/weex_2.6.1-4woody1_powerpc.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-mipsel/weex_2.6.1-4woody1_mipsel.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-mips/weex_2.6.1-4woody1_mips.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-m68k/weex_2.6.1-4woody1_m68k.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-ia64/weex_2.6.1-4woody1_ia64.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-hppa/weex_2.6.1-4woody1_hppa.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-arm/weex_2.6.1-4woody1_arm.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-alpha/weex_2.6.1-4woody1_alpha.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/source/weex_2.6.1-4woody1.dsc
stable/main/binary-i386/weex_2.6.1-4woody1_i386.deb
stable/main/source/weex_2.6.1-4woody1.diff.gz
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-sparc/uptimed_0.1.7-2woody0_sparc.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-s390/uptimed_0.1.7-2woody0_s390.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-powerpc/uptimed_0.1.7-2woody0_powerpc.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-mipsel/uptimed_0.1.7-2woody0_mipsel.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-mips/uptimed_0.1.7-2woody0_mips.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-m68k/uptimed_0.1.7-2woody0_m68k.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-ia64/uptimed_0.1.7-2woody0_ia64.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-hppa/uptimed_0.1.7-2woody0_hppa.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-arm/uptimed_0.1.7-2woody0_arm.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-alpha/uptimed_0.1.7-2woody0_alpha.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/source/uptimed_0.1.7-2woody0.dsc
stable/main/binary-i386/uptimed_0.1.7-2woody0_i386.deb
stable/main/binary-all/uprecords-cgi_0.1.7-2woody0_all.deb
stable/main/source/uptimed_0.1.7-2woody0.diff.gz
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody1_all.deb
stable/contrib/source/tomcat4_4.0.3-3woody1.dsc
stable/contrib/source/tomcat4_4.0.3-3woody1.diff.gz
stable/contrib/binary-all/tomcat4_4.0.3-3woody1_all.deb
stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody1_all.deb
tomcat4 (4.0.3-3woody1) stable-security; urgency=high
  * Include security patch from Tomcat 4.0.5 which fixes a JSP source
    disclosure vulnerability


stable/main/binary-s390/tkmail_4.0beta9-8.1_s390.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-powerpc/tkmail_4.0beta9-8.1_powerpc.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-mipsel/tkmail_4.0beta9-8.1_mipsel.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-mips/tkmail_4.0beta9-8.1_mips.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-m68k/tkmail_4.0beta9-8.1_m68k.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-ia64/tkmail_4.0beta9-8.1_ia64.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-i386/tkmail_4.0beta9-8.1_i386.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-hppa/tkmail_4.0beta9-8.1_hppa.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-arm/tkmail_4.0beta9-8.1_arm.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-alpha/tkmail_4.0beta9-8.1_alpha.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/source/tkmail_4.0beta9-8.1.dsc
stable/main/source/tkmail_4.0beta9-8.1.diff.gz
stable/main/binary-sparc/tkmail_4.0beta9-8.1_sparc.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-s390/tinyproxy_1.4.3-2woody2_s390.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-powerpc/tinyproxy_1.4.3-2woody2_powerpc.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-mipsel/tinyproxy_1.4.3-2woody2_mipsel.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-mips/tinyproxy_1.4.3-2woody2_mips.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-m68k/tinyproxy_1.4.3-2woody2_m68k.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-ia64/tinyproxy_1.4.3-2woody2_ia64.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-i386/tinyproxy_1.4.3-2woody2_i386.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-hppa/tinyproxy_1.4.3-2woody2_hppa.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-arm/tinyproxy_1.4.3-2woody2_arm.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-alpha/tinyproxy_1.4.3-2woody2_alpha.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/source/tinyproxy_1.4.3-2woody2.diff.gz
stable/main/binary-sparc/tinyproxy_1.4.3-2woody2_sparc.deb
stable/main/source/tinyproxy_1.4.3-2woody2.dsc
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.1_sparc.deb
stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.1_sparc.deb
stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.1_sparc.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.1_s390.deb
stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.1_s390.deb
stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.1_s390.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.1_powerpc.deb
stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.1_powerpc.deb
stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.1_powerpc.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.1_mips.deb
stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.1_mips.deb
stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.1_mips.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.1_m68k.deb
stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.1_m68k.deb
stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.1_m68k.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.1_ia64.deb
stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.1_ia64.deb
stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.1_ia64.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.1_i386.deb
stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.1_i386.deb
stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.1_i386.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.1_hppa.deb
stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.1_hppa.deb
stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.1_hppa.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.1_arm.deb
stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.1_arm.deb
stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.1_arm.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.1_alpha.deb
stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.1_alpha.deb
stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.1_alpha.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/source/tetex-bin_1.0.7+20011202-7.1.dsc
stable/main/source/tetex-bin_1.0.7+20011202-7.1.tar.gz
stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.1_mipsel.deb
stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.1_mipsel.deb
stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.1_mipsel.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/source/tendra_4.1.2-9.woody1.diff.gz
stable/main/binary-i386/tendra_4.1.2-9.woody1_i386.deb
stable/main/source/tendra_4.1.2-9.woody1.dsc
tendra (4.1.2-9.woody1) stable; urgency=low
  * Don't copy runtime files.


stable/main/binary-sparc/tcpdump_3.6.2-2.2_sparc.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-s390/tcpdump_3.6.2-2.2_s390.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-powerpc/tcpdump_3.6.2-2.2_powerpc.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-mipsel/tcpdump_3.6.2-2.2_mipsel.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-mips/tcpdump_3.6.2-2.2_mips.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-m68k/tcpdump_3.6.2-2.2_m68k.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-ia64/tcpdump_3.6.2-2.2_ia64.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-hppa/tcpdump_3.6.2-2.2_hppa.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-arm/tcpdump_3.6.2-2.2_arm.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-alpha/tcpdump_3.6.2-2.2_alpha.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/source/tcpdump_3.6.2-2.2.dsc
stable/main/source/tcpdump_3.6.2-2.2.diff.gz
stable/main/binary-i386/tcpdump_3.6.2-2.2_i386.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-sparc/sympa_3.3.3-3_sparc.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-s390/sympa_3.3.3-3_s390.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-powerpc/sympa_3.3.3-3_powerpc.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-mipsel/sympa_3.3.3-3_mipsel.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-mips/sympa_3.3.3-3_mips.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-m68k/sympa_3.3.3-3_m68k.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-ia64/sympa_3.3.3-3_ia64.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-hppa/sympa_3.3.3-3_hppa.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-arm/sympa_3.3.3-3_arm.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-alpha/sympa_3.3.3-3_alpha.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/source/sympa_3.3.3-3.diff.gz
stable/main/source/sympa_3.3.3-3.dsc
stable/main/binary-i386/sympa_3.3.3-3_i386.deb
stable/main/binary-all/wwsympa_3.3.3-3_all.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-sparc/super_3.16.1-1.1_sparc.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-s390/super_3.16.1-1.1_s390.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-powerpc/super_3.16.1-1.1_powerpc.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-mipsel/super_3.16.1-1.1_mipsel.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-mips/super_3.16.1-1.1_mips.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-ia64/super_3.16.1-1.1_ia64.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-i386/super_3.16.1-1.1_i386.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-hppa/super_3.16.1-1.1_hppa.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-arm/super_3.16.1-1.1_arm.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-alpha/super_3.16.1-1.1_alpha.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/source/super_3.16.1-1.1.diff.gz
stable/main/binary-m68k/super_3.16.1-1.1_m68k.deb
stable/main/source/super_3.16.1-1.1.dsc
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/source/squirrelmail_1.2.6-1.2.diff.gz
stable/main/binary-all/squirrelmail_1.2.6-1.2_all.deb
stable/main/source/squirrelmail_1.2.6-1.2.dsc
squirrelmail (1:1.2.6-1.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Fixed the options page, whoops


stable/main/binary-sparc/snort-mysql_1.8.4beta1-3_sparc.deb
stable/main/binary-sparc/snort-common_1.8.4beta1-3_sparc.deb
stable/main/binary-sparc/snort_1.8.4beta1-3_sparc.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-s390/snort_1.8.4beta1-3_s390.deb
stable/main/binary-s390/snort-mysql_1.8.4beta1-3_s390.deb
stable/main/binary-s390/snort-common_1.8.4beta1-3_s390.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-powerpc/snort-common_1.8.4beta1-3_powerpc.deb
stable/main/binary-powerpc/snort_1.8.4beta1-3_powerpc.deb
stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3_powerpc.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3_mipsel.deb
stable/main/binary-mipsel/snort_1.8.4beta1-3_mipsel.deb
stable/main/binary-mipsel/snort-common_1.8.4beta1-3_mipsel.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-mips/snort-common_1.8.4beta1-3_mips.deb
stable/main/binary-mips/snort_1.8.4beta1-3_mips.deb
stable/main/binary-mips/snort-mysql_1.8.4beta1-3_mips.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-m68k/snort-common_1.8.4beta1-3_m68k.deb
stable/main/binary-m68k/snort-mysql_1.8.4beta1-3_m68k.deb
stable/main/binary-m68k/snort_1.8.4beta1-3_m68k.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-ia64/snort-mysql_1.8.4beta1-3_ia64.deb
stable/main/binary-ia64/snort-common_1.8.4beta1-3_ia64.deb
stable/main/binary-ia64/snort_1.8.4beta1-3_ia64.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-hppa/snort-mysql_1.8.4beta1-3_hppa.deb
stable/main/binary-hppa/snort_1.8.4beta1-3_hppa.deb
stable/main/binary-hppa/snort-common_1.8.4beta1-3_hppa.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-arm/snort_1.8.4beta1-3_arm.deb
stable/main/binary-arm/snort-mysql_1.8.4beta1-3_arm.deb
stable/main/binary-arm/snort-common_1.8.4beta1-3_arm.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-alpha/snort_1.8.4beta1-3_alpha.deb
stable/main/binary-alpha/snort-common_1.8.4beta1-3_alpha.deb
stable/main/binary-alpha/snort-mysql_1.8.4beta1-3_alpha.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-all/snort-rules-default_1.8.4beta1-3_all.deb
stable/main/source/snort_1.8.4beta1-3.diff.gz
stable/main/binary-i386/snort-common_1.8.4beta1-3_i386.deb
stable/main/source/snort_1.8.4beta1-3.dsc
stable/main/binary-i386/snort-mysql_1.8.4beta1-3_i386.deb
stable/main/binary-i386/snort_1.8.4beta1-3_i386.deb
stable/main/binary-all/snort-doc_1.8.4beta1-3_all.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-sparc/silo_1.2.5-2_sparc.deb
stable/main/source/silo_1.2.5-2.diff.gz
stable/main/source/silo_1.2.5-2.dsc
silo (1.2.5-2) stable; urgency=low
  * Add patch for UltraSPARC III+ (Cheetah+) support from DaveM.


stable/main/binary-s390/libscrollkeeper0_0.3.6-3.1_s390.deb
stable/main/binary-s390/libscrollkeeper-dev_0.3.6-3.1_s390.deb
stable/main/binary-s390/scrollkeeper_0.3.6-3.1_s390.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-powerpc/libscrollkeeper0_0.3.6-3.1_powerpc.deb
stable/main/binary-powerpc/scrollkeeper_0.3.6-3.1_powerpc.deb
stable/main/binary-powerpc/libscrollkeeper-dev_0.3.6-3.1_powerpc.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-mipsel/libscrollkeeper0_0.3.6-3.1_mipsel.deb
stable/main/binary-mipsel/libscrollkeeper-dev_0.3.6-3.1_mipsel.deb
stable/main/binary-mipsel/scrollkeeper_0.3.6-3.1_mipsel.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-mips/libscrollkeeper0_0.3.6-3.1_mips.deb
stable/main/binary-mips/libscrollkeeper-dev_0.3.6-3.1_mips.deb
stable/main/binary-mips/scrollkeeper_0.3.6-3.1_mips.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-m68k/libscrollkeeper0_0.3.6-3.1_m68k.deb
stable/main/binary-m68k/libscrollkeeper-dev_0.3.6-3.1_m68k.deb
stable/main/binary-m68k/scrollkeeper_0.3.6-3.1_m68k.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-ia64/libscrollkeeper0_0.3.6-3.1_ia64.deb
stable/main/binary-ia64/scrollkeeper_0.3.6-3.1_ia64.deb
stable/main/binary-ia64/libscrollkeeper-dev_0.3.6-3.1_ia64.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-i386/libscrollkeeper-dev_0.3.6-3.1_i386.deb
stable/main/binary-i386/scrollkeeper_0.3.6-3.1_i386.deb
stable/main/binary-i386/libscrollkeeper0_0.3.6-3.1_i386.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-hppa/libscrollkeeper0_0.3.6-3.1_hppa.deb
stable/main/binary-hppa/libscrollkeeper-dev_0.3.6-3.1_hppa.deb
stable/main/binary-hppa/scrollkeeper_0.3.6-3.1_hppa.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-arm/libscrollkeeper-dev_0.3.6-3.1_arm.deb
stable/main/binary-arm/libscrollkeeper0_0.3.6-3.1_arm.deb
stable/main/binary-arm/scrollkeeper_0.3.6-3.1_arm.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-alpha/scrollkeeper_0.3.6-3.1_alpha.deb
stable/main/binary-alpha/libscrollkeeper0_0.3.6-3.1_alpha.deb
stable/main/binary-alpha/libscrollkeeper-dev_0.3.6-3.1_alpha.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-sparc/libscrollkeeper-dev_0.3.6-3.1_sparc.deb
stable/main/binary-sparc/libscrollkeeper0_0.3.6-3.1_sparc.deb
stable/main/source/scrollkeeper_0.3.6-3.1.dsc
stable/main/binary-sparc/scrollkeeper_0.3.6-3.1_sparc.deb
stable/main/source/scrollkeeper_0.3.6-3.1.diff.gz
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-sparc/samba_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libpam-smbpass_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-12_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-12_sparc.deb
stable/main/binary-sparc/samba-common_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-12_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-12_sparc.deb
stable/main/binary-sparc/swat_2.2.3a-12_sparc.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-s390/libsmbclient-dev_2.2.3a-12_s390.deb
stable/main/binary-s390/libpam-smbpass_2.2.3a-12_s390.deb
stable/main/binary-s390/smbclient_2.2.3a-12_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-12_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-12_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-12_s390.deb
stable/main/binary-s390/samba_2.2.3a-12_s390.deb
stable/main/binary-s390/swat_2.2.3a-12_s390.deb
stable/main/binary-s390/winbind_2.2.3a-12_s390.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-powerpc/winbind_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/samba_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12_powerpc.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-mipsel/smbclient_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/smbfs_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/samba-common_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-12_mipsel.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-mips/swat_2.2.3a-12_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-12_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-12_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-12_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-12_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-12_mips.deb
stable/main/binary-mips/smbclient_2.2.3a-12_mips.deb
stable/main/binary-mips/winbind_2.2.3a-12_mips.deb
stable/main/binary-mips/samba_2.2.3a-12_mips.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-m68k/swat_2.2.3a-12_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-12_m68k.deb
stable/main/binary-m68k/winbind_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12_m68k.deb
stable/main/binary-m68k/samba-common_2.2.3a-12_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-12_m68k.deb
stable/main/binary-m68k/smbfs_2.2.3a-12_m68k.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-ia64/libsmbclient_2.2.3a-12_ia64.deb
stable/main/binary-ia64/smbfs_2.2.3a-12_ia64.deb
stable/main/binary-ia64/swat_2.2.3a-12_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-12_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-12_ia64.deb
stable/main/binary-ia64/smbclient_2.2.3a-12_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-12_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-12_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12_ia64.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-hppa/libsmbclient_2.2.3a-12_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-12_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-12_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-12_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-12_hppa.deb
stable/main/binary-hppa/swat_2.2.3a-12_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-12_hppa.deb
stable/main/binary-hppa/samba_2.2.3a-12_hppa.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-arm/samba-common_2.2.3a-12_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-12_arm.deb
stable/main/binary-arm/winbind_2.2.3a-12_arm.deb
stable/main/binary-arm/swat_2.2.3a-12_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-12_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-12_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-12_arm.deb
stable/main/binary-arm/smbclient_2.2.3a-12_arm.deb
stable/main/binary-arm/samba_2.2.3a-12_arm.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-alpha/libpam-smbpass_2.2.3a-12_alpha.deb
stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-12_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-12_alpha.deb
stable/main/binary-alpha/swat_2.2.3a-12_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-12_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-12_alpha.deb
stable/main/binary-alpha/smbclient_2.2.3a-12_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-12_alpha.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-all/samba-doc_2.2.3a-12_all.deb
stable/main/binary-i386/libpam-smbpass_2.2.3a-12_i386.deb
stable/main/binary-i386/samba_2.2.3a-12_i386.deb
stable/main/binary-i386/samba-common_2.2.3a-12_i386.deb
stable/main/source/samba_2.2.3a-12.diff.gz
stable/main/source/samba_2.2.3a-12.dsc
stable/main/binary-i386/winbind_2.2.3a-12_i386.deb
stable/main/binary-i386/smbfs_2.2.3a-12_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-12_i386.deb
stable/main/binary-i386/libsmbclient-dev_2.2.3a-12_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-12_i386.deb
stable/main/binary-i386/swat_2.2.3a-12_i386.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-sparc/librio500-dev_0.7-7woody2_sparc.deb
stable/main/binary-sparc/rio500_0.7-7woody2_sparc.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-s390/librio500-dev_0.7-7woody2_s390.deb
stable/main/binary-s390/rio500_0.7-7woody2_s390.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-powerpc/librio500-dev_0.7-7woody2_powerpc.deb
stable/main/binary-powerpc/rio500_0.7-7woody2_powerpc.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-mipsel/librio500-dev_0.7-7woody2_mipsel.deb
stable/main/binary-mipsel/rio500_0.7-7woody2_mipsel.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-mips/librio500-dev_0.7-7woody2_mips.deb
stable/main/binary-mips/rio500_0.7-7woody2_mips.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-m68k/librio500-dev_0.7-7woody2_m68k.deb
stable/main/binary-m68k/rio500_0.7-7woody2_m68k.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-ia64/librio500-dev_0.7-7woody2_ia64.deb
stable/main/binary-ia64/rio500_0.7-7woody2_ia64.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-hppa/librio500-dev_0.7-7woody2_hppa.deb
stable/main/binary-hppa/rio500_0.7-7woody2_hppa.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-arm/rio500_0.7-7woody2_arm.deb
stable/main/binary-arm/librio500-dev_0.7-7woody2_arm.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-alpha/rio500_0.7-7woody2_alpha.deb
stable/main/binary-alpha/librio500-dev_0.7-7woody2_alpha.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-i386/librio500-dev_0.7-7woody2_i386.deb
stable/main/source/rio500_0.7-7woody2.diff.gz
stable/main/binary-i386/rio500_0.7-7woody2_i386.deb
stable/main/source/rio500_0.7-7woody2.dsc
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-sparc/qpopper_4.0.4-2.woody.1_sparc.deb
stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.1_sparc.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-s390/qpopper_4.0.4-2.woody.1_s390.deb
stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.1_s390.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-powerpc/qpopper_4.0.4-2.woody.1_powerpc.deb
stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.1_powerpc.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-mipsel/qpopper_4.0.4-2.woody.1_mipsel.deb
stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.1_mipsel.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-mips/qpopper_4.0.4-2.woody.1_mips.deb
stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.1_mips.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.1_m68k.deb
stable/main/binary-m68k/qpopper_4.0.4-2.woody.1_m68k.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-ia64/qpopper_4.0.4-2.woody.1_ia64.deb
stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.1_ia64.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-hppa/qpopper_4.0.4-2.woody.1_hppa.deb
stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.1_hppa.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.1_arm.deb
stable/main/binary-arm/qpopper_4.0.4-2.woody.1_arm.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.1_alpha.deb
stable/main/binary-alpha/qpopper_4.0.4-2.woody.1_alpha.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.1_i386.deb
stable/main/source/qpopper_4.0.4-2.woody.1.dsc
stable/main/source/qpopper_4.0.4-2.woody.1.diff.gz
stable/main/binary-i386/qpopper_4.0.4-2.woody.1_i386.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-s390/python1.5-mpz_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-gdbm_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-tk_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-dev_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5_1.5.2-23.3_s390.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-powerpc/python1.5_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-gdbm_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-tk_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-mpz_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-dev_1.5.2-23.3_powerpc.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-mipsel/python1.5-dev_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-tk_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-mpz_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-gdbm_1.5.2-23.3_mipsel.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-mips/python1.5-gdbm_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-tk_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-dev_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-mpz_1.5.2-23.3_mips.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-m68k/python1.5_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-mpz_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-gdbm_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-dev_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-tk_1.5.2-23.3_m68k.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-ia64/python1.5-dev_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-tk_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-gdbm_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-mpz_1.5.2-23.3_ia64.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-i386/python1.5-mpz_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-gdbm_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-dev_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-tk_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5_1.5.2-23.3_i386.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-hppa/python1.5_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-mpz_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-tk_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-dev_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-gdbm_1.5.2-23.3_hppa.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-arm/python1.5_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-tk_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-mpz_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-dev_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-gdbm_1.5.2-23.3_arm.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-alpha/python1.5-gdbm_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-mpz_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-dev_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-tk_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5_1.5.2-23.3_alpha.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-sparc/python1.5-mpz_1.5.2-23.3_sparc.deb
stable/main/binary-sparc/python1.5-tk_1.5.2-23.3_sparc.deb
stable/main/binary-sparc/python1.5-dev_1.5.2-23.3_sparc.deb
stable/main/source/python1.5_1.5.2-23.3.dsc
stable/main/binary-all/idle-python1.5_1.5.2-23.3_all.deb
stable/main/binary-sparc/python1.5_1.5.2-23.3_sparc.deb
stable/main/binary-all/python1.5-examples_1.5.2-23.3_all.deb
stable/main/binary-sparc/python1.5-gdbm_1.5.2-23.3_sparc.deb
stable/main/source/python1.5_1.5.2-23.3.diff.gz
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-s390/purity_1-14.2_s390.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-powerpc/purity_1-14.2_powerpc.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-mipsel/purity_1-14.2_mipsel.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-mips/purity_1-14.2_mips.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-m68k/purity_1-14.2_m68k.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-ia64/purity_1-14.2_ia64.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-i386/purity_1-14.2_i386.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-hppa/purity_1-14.2_hppa.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-arm/purity_1-14.2_arm.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-alpha/purity_1-14.2_alpha.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/source/purity_1-14.2.dsc
stable/main/source/purity_1-14.2.diff.gz
stable/main/binary-sparc/purity_1-14.2_sparc.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-m68k/postfix-tls_1.1.11+tls0.7.15-0.woody1_m68k.deb
postfix-tls (1.1.11+tls0.7.15-0.woody1) testing; urgency=low
  * New postfix release.


stable/main/binary-sparc/php4-mysql_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-6_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-gd_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-imap_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4_4.1.2-6_sparc.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-s390/php4-mhash_4.1.2-6_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-6_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-6_s390.deb
stable/main/binary-s390/php4-mcal_4.1.2-6_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-6_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-6_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-6_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-6_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-6_s390.deb
stable/main/binary-s390/php4_4.1.2-6_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-6_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-6_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-6_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-6_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-6_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-6_s390.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-mipsel/php4-recode_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-gd_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mhash_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-6_mipsel.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-mips/php4-domxml_4.1.2-6_mips.deb
stable/main/binary-mips/php4_4.1.2-6_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-6_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-6_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-6_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-6_mips.deb
stable/main/binary-mips/php4-sybase_4.1.2-6_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-6_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-6_mips.deb
stable/main/binary-mips/php4-cgi_4.1.2-6_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-6_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mhash_4.1.2-6_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-6_mips.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-m68k/caudium-php4_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-sybase_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-curl_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-6_m68k.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-ia64/php4-xslt_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-snmp_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-odbc_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-6_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-gd_4.1.2-6_ia64.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-hppa/php4-imap_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-cgi_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mysql_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-sybase_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-odbc_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-6_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-gd_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mcal_4.1.2-6_hppa.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-arm/php4-odbc_4.1.2-6_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-6_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-6_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-6_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-6_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-6_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-6_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-6_arm.deb
stable/main/binary-arm/php4_4.1.2-6_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-6_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-6_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mhash_4.1.2-6_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-6_arm.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-alpha/php4-ldap_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-imap_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mhash_4.1.2-6_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mcal_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4_4.1.2-6_alpha.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-powerpc/php4-mcal_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-gd_4.1.2-6_i386.deb
stable/main/binary-i386/php4_4.1.2-6_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-6_i386.deb
stable/main/binary-all/php4-pear_4.1.2-6_all.deb
stable/main/binary-i386/php4-ldap_4.1.2-6_i386.deb
stable/main/binary-all/php4-dev_4.1.2-6_all.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-curl_4.1.2-6_i386.deb
stable/main/source/php4_4.1.2-6.dsc
stable/main/binary-powerpc/php4-sybase_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-mcal_4.1.2-6_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-6_i386.deb
stable/main/binary-i386/php4-mysql_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-xslt_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-snmp_4.1.2-6_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-6_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-ldap_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-6_powerpc.deb
stable/main/source/php4_4.1.2-6.diff.gz
stable/main/binary-powerpc/php4-gd_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-xslt_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-cgi_4.1.2-6_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-6_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-mhash_4.1.2-6_i386.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-xml_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-gd_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-magick_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-dev_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-imap_3.0.18-23.1woody1_sparc.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-s390/php3-dev_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-snmp_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-xml_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-ldap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-imap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-gd_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-mhash_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-mysql_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-magick_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi_3.0.18-23.1woody1_s390.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody1_powerpc.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody1_mipsel.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-mips/php3-gd_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-magick_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-imap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-ldap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-mhash_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-dev_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-snmp_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-xml_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-mysql_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi_3.0.18-23.1woody1_mips.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-dev_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-imap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-xml_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-magick_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-gd_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody1_m68k.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-ia64/php3-dev_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-magick_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-imap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-gd_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-xml_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody1_ia64.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-imap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-xml_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-dev_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-magick_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-gd_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody1_hppa.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-imap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-gd_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-ldap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-dev_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-xml_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-mysql_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-mhash_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-magick_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-snmp_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody1_arm.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-magick_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-xml_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-imap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-gd_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-dev_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody1_alpha.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-i386/php3-dev_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-ldap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-xml_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-mysql_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody1_i386.deb
stable/main/source/php3_3.0.18-23.1woody1.dsc
stable/main/binary-all/php3-doc_3.0.18-23.1woody1_all.deb
stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-mhash_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-imap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-gd_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-magick_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-snmp_3.0.18-23.1woody1_i386.deb
stable/main/source/php3_3.0.18-23.1woody1.diff.gz
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-i386/pcmcia-modules-2.2.22_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22.


stable/main/binary-i386/pcmcia-modules-2.2.22-idepci_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22-idepci.


stable/main/binary-i386/pcmcia-modules-2.2.22-compact_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22-compact.


stable/main/binary-ia64/ssh_3.4p1-1_ia64.deb
stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1_ia64.deb
openssh (1:3.4p1-1) testing; urgency=high
  * Extend my tendrils back into this package (Closes: #150915, #151098)
  * thanks to the security team for their work
  * no thanks to ISS/Theo de Raadt for their handling of these bugs
  * save old sshd_configs to sshd_config.dpkg-old when auto-generating a
    new one
  * tell/ask the user about PriviledgeSeparation
  * /etc/init.d/ssh run will now create the chroot empty dir if necessary
  * Remove our previous statoverride on /usr/bin/ssh (only for people
    upgrading from a version where we'd put one in ourselves!)
  * Stop slandering Russia, since someone asked so nicely (Closes: #148951)
  * Reduce the sleep time in /etc/init.d/ssh during a restart


stable/main/binary-sparc/openafs-fileserver_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-dbserver_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/libopenafs-dev_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-kpasswd_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-client_1.2.3final2-6_sparc.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-s390/libopenafs-dev_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-fileserver_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-kpasswd_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-dbserver_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-client_1.2.3final2-6_s390.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-powerpc/openafs-kpasswd_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-client_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-dbserver_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-fileserver_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/libopenafs-dev_1.2.3final2-6_powerpc.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-alpha/openafs-dbserver_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-fileserver_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/libopenafs-dev_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-client_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-kpasswd_1.2.3final2-6_alpha.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-i386/openafs-fileserver_1.2.3final2-6_i386.deb
stable/main/binary-i386/libopenafs-dev_1.2.3final2-6_i386.deb
stable/main/binary-i386/openafs-dbserver_1.2.3final2-6_i386.deb
stable/main/binary-i386/openafs-kpasswd_1.2.3final2-6_i386.deb
stable/main/source/openafs_1.2.3final2-6.dsc
stable/main/binary-all/openafs-modules-source_1.2.3final2-6_all.deb
stable/main/binary-i386/openafs-client_1.2.3final2-6_i386.deb
stable/main/source/openafs_1.2.3final2-6.diff.gz
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-sparc/octave2.1_2.1.35-7woody1_sparc.deb
stable/main/binary-sparc/octave2.1-headers_2.1.35-7woody1_sparc.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-s390/octave2.1-headers_2.1.35-7woody1_s390.deb
stable/main/binary-s390/octave2.1_2.1.35-7woody1_s390.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-powerpc/octave2.1_2.1.35-7woody1_powerpc.deb
stable/main/binary-powerpc/octave2.1-headers_2.1.35-7woody1_powerpc.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-mipsel/octave2.1_2.1.35-7woody1_mipsel.deb
stable/main/binary-mipsel/octave2.1-headers_2.1.35-7woody1_mipsel.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-mips/octave2.1-headers_2.1.35-7woody1_mips.deb
stable/main/binary-mips/octave2.1_2.1.35-7woody1_mips.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-m68k/octave2.1_2.1.35-7woody1_m68k.deb
stable/main/binary-m68k/octave2.1-headers_2.1.35-7woody1_m68k.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-ia64/octave2.1_2.1.35-7woody1_ia64.deb
stable/main/binary-ia64/octave2.1-headers_2.1.35-7woody1_ia64.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-hppa/octave2.1-headers_2.1.35-7woody1_hppa.deb
stable/main/binary-hppa/octave2.1_2.1.35-7woody1_hppa.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-alpha/octave2.1-headers_2.1.35-7woody1_alpha.deb
stable/main/binary-alpha/octave2.1_2.1.35-7woody1_alpha.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-i386/octave2.1_2.1.35-7woody1_i386.deb
stable/main/source/octave2.1_2.1.35-7woody1.dsc
stable/main/binary-all/octave2.1-htmldoc_2.1.35-7woody1_all.deb
stable/main/binary-i386/octave2.1-headers_2.1.35-7woody1_i386.deb
stable/main/binary-all/octave2.1-info_2.1.35-7woody1_all.deb
stable/main/binary-all/octave2.1-emacsen_2.1.35-7woody1_all.deb
stable/main/source/octave2.1_2.1.35-7woody1.diff.gz
stable/main/binary-all/octave2.1-doc_2.1.35-7woody1_all.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-sparc/ocaml_3.04-14_sparc.deb
stable/main/binary-sparc/ocaml-native-compilers_3.04-14_sparc.deb
stable/main/binary-sparc/ocaml-base_3.04-14_sparc.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-s390/ocaml-base_3.04-14_s390.deb
stable/main/binary-s390/ocaml_3.04-14_s390.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-powerpc/ocaml-native-compilers_3.04-14_powerpc.deb
stable/main/binary-powerpc/ocaml_3.04-14_powerpc.deb
stable/main/binary-powerpc/ocaml-base_3.04-14_powerpc.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-mipsel/ocaml-base_3.04-14_mipsel.deb
stable/main/binary-mipsel/ocaml_3.04-14_mipsel.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-mips/ocaml-base_3.04-14_mips.deb
stable/main/binary-mips/ocaml_3.04-14_mips.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-m68k/ocaml_3.04-14_m68k.deb
stable/main/binary-m68k/ocaml-base_3.04-14_m68k.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-ia64/ocaml-base_3.04-14_ia64.deb
stable/main/binary-ia64/ocaml_3.04-14_ia64.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-i386/ocaml-base_3.04-14_i386.deb
stable/main/binary-i386/ocaml-native-compilers_3.04-14_i386.deb
stable/main/binary-i386/ocaml_3.04-14_i386.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-hppa/ocaml-base_3.04-14_hppa.deb
stable/main/binary-hppa/ocaml_3.04-14_hppa.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-arm/ocaml_3.04-14_arm.deb
stable/main/binary-arm/ocaml-base_3.04-14_arm.deb
stable/main/binary-arm/ocaml-native-compilers_3.04-14_arm.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-all/ocaml-source_3.04-14_all.deb
stable/main/source/ocaml_3.04-14.diff.gz
stable/main/binary-alpha/ocaml-base_3.04-14_alpha.deb
stable/main/binary-alpha/ocaml_3.04-14_alpha.deb
stable/main/binary-alpha/ocaml-native-compilers_3.04-14_alpha.deb
stable/main/source/ocaml_3.04-14.dsc
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-s390/nullmailer_1.00RC5-16.1woody2_s390.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-powerpc/nullmailer_1.00RC5-16.1woody2_powerpc.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-mipsel/nullmailer_1.00RC5-16.1woody2_mipsel.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-mips/nullmailer_1.00RC5-16.1woody2_mips.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-m68k/nullmailer_1.00RC5-16.1woody2_m68k.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-ia64/nullmailer_1.00RC5-16.1woody2_ia64.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-i386/nullmailer_1.00RC5-16.1woody2_i386.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-hppa/nullmailer_1.00RC5-16.1woody2_hppa.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-arm/nullmailer_1.00RC5-16.1woody2_arm.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-alpha/nullmailer_1.00RC5-16.1woody2_alpha.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-sparc/nullmailer_1.00RC5-16.1woody2_sparc.deb
stable/main/source/nullmailer_1.00RC5-16.1woody2.diff.gz
stable/main/source/nullmailer_1.00RC5-16.1woody2.dsc
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-s390/nis_3.9-6.1_s390.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-powerpc/nis_3.9-6.1_powerpc.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-mipsel/nis_3.9-6.1_mipsel.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-mips/nis_3.9-6.1_mips.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-m68k/nis_3.9-6.1_m68k.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-ia64/nis_3.9-6.1_ia64.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-i386/nis_3.9-6.1_i386.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-hppa/nis_3.9-6.1_hppa.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-arm/nis_3.9-6.1_arm.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-alpha/nis_3.9-6.1_alpha.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-sparc/nis_3.9-6.1_sparc.deb
stable/main/source/nis_3.9-6.1.dsc
stable/main/source/nis_3.9-6.1.diff.gz
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-s390/libnessus-dev_1.0.10-2.0.1_s390.deb
stable/main/binary-s390/libnessus1_1.0.10-2.0.1_s390.deb
nessus-libraries (1.0.10-2.0.1) stable; urgency=low
  * Binary NMU to get rid of the libgmp3 library name, so that
    nessus-core builds.


stable/main/binary-s390/nessusd_1.0.10-2.0.1_s390.deb
stable/main/binary-s390/nessus_1.0.10-2.0.1_s390.deb
nessus-core (1.0.10-2.0.1) stable; urgency=low
  * Binary NMU to get rid of the libgmp3 library name using a rebuilt
    nessus-libraries package.


stable/main/binary-powerpc/nessusd_1.0.10-2_powerpc.deb
stable/main/binary-powerpc/nessus_1.0.10-2_powerpc.deb
nessus-core (1.0.10-2) unstable; urgency=low
  * Moved to main. The only component of Nessus that needed non-US was
    an encryption layer library within the libnessus package.


stable/main/binary-sparc/murasaki_0.5.4-2.1_sparc.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-s390/murasaki_0.5.4-2.1_s390.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-powerpc/murasaki_0.5.4-2.1_powerpc.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-mipsel/murasaki_0.5.4-2.1_mipsel.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-mips/murasaki_0.5.4-2.1_mips.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-m68k/murasaki_0.5.4-2.1_m68k.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-ia64/murasaki_0.5.4-2.1_ia64.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-hppa/murasaki_0.5.4-2.1_hppa.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-arm/murasaki_0.5.4-2.1_arm.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-alpha/murasaki_0.5.4-2.1_alpha.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/source/murasaki_0.5.4-2.1.diff.gz
stable/main/binary-i386/murasaki_0.5.4-2.1_i386.deb
stable/main/source/murasaki_0.5.4-2.1.dsc
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-sparc/muddleftpd_1.3.11-7woody2_sparc.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-s390/muddleftpd_1.3.11-7woody2_s390.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-powerpc/muddleftpd_1.3.11-7woody2_powerpc.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-mipsel/muddleftpd_1.3.11-7woody2_mipsel.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-mips/muddleftpd_1.3.11-7woody2_mips.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-m68k/muddleftpd_1.3.11-7woody2_m68k.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-ia64/muddleftpd_1.3.11-7woody2_ia64.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-hppa/muddleftpd_1.3.11-7woody2_hppa.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-arm/muddleftpd_1.3.11-7woody2_arm.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-alpha/muddleftpd_1.3.11-7woody2_alpha.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/source/muddleftpd_1.3.11-7woody2.diff.gz
stable/main/source/muddleftpd_1.3.11-7woody2.dsc
stable/main/binary-i386/muddleftpd_1.3.11-7woody2_i386.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/contrib/source/msttcorefonts_1.0.2.tar.gz
stable/contrib/binary-all/msttcorefonts_1.0.2_all.deb
stable/contrib/source/msttcorefonts_1.0.2.dsc
msttcorefonts (1.0.2) stable; urgency=low
  * change base URL, Closes: #165926


stable/main/binary-s390/mpqc_2.0.4-1.1_s390.deb
stable/main/binary-s390/libsc2_2.0.4-1.1_s390.deb
stable/main/binary-s390/libsc-dev_2.0.4-1.1_s390.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-powerpc/mpqc_2.0.4-1.1_powerpc.deb
stable/main/binary-powerpc/libsc2_2.0.4-1.1_powerpc.deb
stable/main/binary-powerpc/libsc-dev_2.0.4-1.1_powerpc.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-m68k/libsc-dev_2.0.4-1.1_m68k.deb
stable/main/binary-m68k/mpqc_2.0.4-1.1_m68k.deb
stable/main/binary-m68k/libsc2_2.0.4-1.1_m68k.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-ia64/libsc-dev_2.0.4-1.1_ia64.deb
stable/main/binary-ia64/mpqc_2.0.4-1.1_ia64.deb
stable/main/binary-ia64/libsc2_2.0.4-1.1_ia64.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-i386/libsc2_2.0.4-1.1_i386.deb
stable/main/binary-i386/libsc-dev_2.0.4-1.1_i386.deb
stable/main/binary-i386/mpqc_2.0.4-1.1_i386.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-hppa/libsc2_2.0.4-1.1_hppa.deb
stable/main/binary-hppa/libsc-dev_2.0.4-1.1_hppa.deb
stable/main/binary-hppa/mpqc_2.0.4-1.1_hppa.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-sparc/libsc2_2.0.4-1.1_sparc.deb
stable/main/binary-sparc/libsc-dev_2.0.4-1.1_sparc.deb
stable/main/source/mpqc_2.0.4-1.1.diff.gz
stable/main/binary-all/libsc-doc_2.0.4-1.1_all.deb
stable/main/binary-sparc/mpqc_2.0.4-1.1_sparc.deb
stable/main/source/mpqc_2.0.4-1.1.dsc
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-sparc/mpack_1.5-7woody2_sparc.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-s390/mpack_1.5-7woody2_s390.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-powerpc/mpack_1.5-7woody2_powerpc.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-mipsel/mpack_1.5-7woody2_mipsel.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-mips/mpack_1.5-7woody2_mips.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-ia64/mpack_1.5-7woody2_ia64.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-i386/mpack_1.5-7woody2_i386.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-hppa/mpack_1.5-7woody2_hppa.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-arm/mpack_1.5-7woody2_arm.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-alpha/mpack_1.5-7woody2_alpha.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/source/mpack_1.5-7woody2.diff.gz
stable/main/source/mpack_1.5-7woody2.dsc
stable/main/binary-m68k/mpack_1.5-7woody2_m68k.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-s390/libmm11-dev_1.1.3-6.1_s390.deb
stable/main/binary-s390/libmm11_1.1.3-6.1_s390.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-powerpc/libmm11_1.1.3-6.1_powerpc.deb
stable/main/binary-powerpc/libmm11-dev_1.1.3-6.1_powerpc.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-mipsel/libmm11-dev_1.1.3-6.1_mipsel.deb
stable/main/binary-mipsel/libmm11_1.1.3-6.1_mipsel.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-mips/libmm11-dev_1.1.3-6.1_mips.deb
stable/main/binary-mips/libmm11_1.1.3-6.1_mips.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-m68k/libmm11_1.1.3-6.1_m68k.deb
stable/main/binary-m68k/libmm11-dev_1.1.3-6.1_m68k.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-ia64/libmm11-dev_1.1.3-6.1_ia64.deb
stable/main/binary-ia64/libmm11_1.1.3-6.1_ia64.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-i386/libmm11_1.1.3-6.1_i386.deb
stable/main/binary-i386/libmm11-dev_1.1.3-6.1_i386.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-hppa/libmm11-dev_1.1.3-6.1_hppa.deb
stable/main/binary-hppa/libmm11_1.1.3-6.1_hppa.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-arm/libmm11-dev_1.1.3-6.1_arm.deb
stable/main/binary-arm/libmm11_1.1.3-6.1_arm.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-alpha/libmm11-dev_1.1.3-6.1_alpha.deb
stable/main/binary-alpha/libmm11_1.1.3-6.1_alpha.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/source/mm_1.1.3-6.1.dsc
stable/main/binary-sparc/libmm11-dev_1.1.3-6.1_sparc.deb
stable/main/binary-sparc/libmm11_1.1.3-6.1_sparc.deb
stable/main/source/mm_1.1.3-6.1.diff.gz
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/source/mhonarc_2.5.2-1.2.diff.gz
stable/main/source/mhonarc_2.5.2-1.2.dsc
stable/main/binary-all/mhonarc_2.5.2-1.2_all.deb
mhonarc (2.5.2-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Make sure to htmlize name parameter to avoid any potential
    XSS. (upstream)
  * XSS vulnerability with message header fields fixed: Message header
    field names were not escaped during conversion to HTML.  Hence,
    an attacker could including scripting markup in the message
    header. (upstream)


stable/main/binary-s390/masqmail_0.1.16-2.1_s390.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-powerpc/masqmail_0.1.16-2.1_powerpc.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-mipsel/masqmail_0.1.16-2.1_mipsel.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-mips/masqmail_0.1.16-2.1_mips.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-m68k/masqmail_0.1.16-2.1_m68k.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-ia64/masqmail_0.1.16-2.1_ia64.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-i386/masqmail_0.1.16-2.1_i386.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-hppa/masqmail_0.1.16-2.1_hppa.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-arm/masqmail_0.1.16-2.1_arm.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-alpha/masqmail_0.1.16-2.1_alpha.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/source/masqmail_0.1.16-2.1.diff.gz
stable/main/binary-sparc/masqmail_0.1.16-2.1_sparc.deb
stable/main/source/masqmail_0.1.16-2.1.dsc
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-all/mantis_0.17.1-2.5_all.deb
stable/main/source/mantis_0.17.1-2.5.diff.gz
stable/main/source/mantis_0.17.1-2.5.dsc
mantis (0.17.1-2.5) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream changes to fix privilege escalation with private
    bugs (Mantis Advisory/2002-06)
  * Applied upstream changes to privilege escalation when no projects are
    accessable to the user (Mantis Advisory/2002-07)
  * Applied upstream fixes to fix the problem that Mantis ignores settings
    here and there (Mantis Advisory/2002-08)
  * Removed whitespace at the end of core_user_API.php (closes:
    Bug#159369)
  * Modified patches and files so dpkg-source doesn't complain about
    missing newlines anymore, gnarf.


stable/main/binary-s390/mailman_2.0.11-1woody5_s390.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-powerpc/mailman_2.0.11-1woody5_powerpc.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-mipsel/mailman_2.0.11-1woody5_mipsel.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-mips/mailman_2.0.11-1woody5_mips.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-m68k/mailman_2.0.11-1woody5_m68k.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-ia64/mailman_2.0.11-1woody5_ia64.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-i386/mailman_2.0.11-1woody5_i386.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-hppa/mailman_2.0.11-1woody5_hppa.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-arm/mailman_2.0.11-1woody5_arm.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-alpha/mailman_2.0.11-1woody5_alpha.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/source/mailman_2.0.11-1woody5.dsc
stable/main/source/mailman_2.0.11-1woody5.diff.gz
stable/main/binary-sparc/mailman_2.0.11-1woody5_sparc.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/source/luxman_0.41-17.1.diff.gz
stable/main/binary-i386/luxman_0.41-17.1_i386.deb
stable/main/source/luxman_0.41-17.1.dsc
luxman (0.41-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Use the full path for gzip to fix local root exploit in maped.  Thanks
    to iDEFENSE for reporting this.


stable/main/binary-sparc/logtool_1.0.6-7.woody.1_sparc.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-s390/logtool_1.0.6-7.woody.1_s390.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-powerpc/logtool_1.0.6-7.woody.1_powerpc.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-mipsel/logtool_1.0.6-7.woody.1_mipsel.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-mips/logtool_1.0.6-7.woody.1_mips.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-m68k/logtool_1.0.6-7.woody.1_m68k.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-ia64/logtool_1.0.6-7.woody.1_ia64.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-hppa/logtool_1.0.6-7.woody.1_hppa.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-arm/logtool_1.0.6-7.woody.1_arm.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-alpha/logtool_1.0.6-7.woody.1_alpha.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-i386/logtool_1.0.6-7.woody.1_i386.deb
stable/main/source/logtool_1.0.6-7.woody.1.dsc
stable/main/source/logtool_1.0.6-7.woody.1.diff.gz
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-s390/log2mail_0.2.5.1_s390.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-powerpc/log2mail_0.2.5.1_powerpc.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-mipsel/log2mail_0.2.5.1_mipsel.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-mips/log2mail_0.2.5.1_mips.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-m68k/log2mail_0.2.5.1_m68k.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-ia64/log2mail_0.2.5.1_ia64.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-i386/log2mail_0.2.5.1_i386.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-hppa/log2mail_0.2.5.1_hppa.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-arm/log2mail_0.2.5.1_arm.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-alpha/log2mail_0.2.5.1_alpha.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-sparc/log2mail_0.2.5.1_sparc.deb
stable/main/source/log2mail_0.2.5.1.dsc
stable/main/source/log2mail_0.2.5.1.tar.gz
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-sparc/libquota-perl_1.4.1-2_sparc.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-s390/libquota-perl_1.4.1-2_s390.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-powerpc/libquota-perl_1.4.1-2_powerpc.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-mipsel/libquota-perl_1.4.1-2_mipsel.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-mips/libquota-perl_1.4.1-2_mips.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-m68k/libquota-perl_1.4.1-2_m68k.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-ia64/libquota-perl_1.4.1-2_ia64.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-hppa/libquota-perl_1.4.1-2_hppa.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-arm/libquota-perl_1.4.1-2_arm.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-alpha/libquota-perl_1.4.1-2_alpha.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/source/libquota-perl_1.4.1-2.dsc
stable/main/source/libquota-perl_1.4.1-2.diff.gz
stable/main/binary-i386/libquota-perl_1.4.1-2_i386.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.2_s390.deb
stable/main/binary-s390/libpng2_1.0.12-3.woody.2_s390.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.2_powerpc.deb
stable/main/binary-powerpc/libpng2_1.0.12-3.woody.2_powerpc.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.2_mipsel.deb
stable/main/binary-mipsel/libpng2_1.0.12-3.woody.2_mipsel.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.2_mips.deb
stable/main/binary-mips/libpng2_1.0.12-3.woody.2_mips.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-m68k/libpng2_1.0.12-3.woody.2_m68k.deb
stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.2_m68k.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.2_ia64.deb
stable/main/binary-ia64/libpng2_1.0.12-3.woody.2_ia64.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-i386/libpng2_1.0.12-3.woody.2_i386.deb
stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.2_i386.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.2_hppa.deb
stable/main/binary-hppa/libpng2_1.0.12-3.woody.2_hppa.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-arm/libpng2_1.0.12-3.woody.2_arm.deb
stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.2_arm.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-alpha/libpng2_1.0.12-3.woody.2_alpha.deb
stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.2_alpha.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/source/libpng_1.0.12-3.woody.2.diff.gz
stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.2_sparc.deb
stable/main/binary-sparc/libpng2_1.0.12-3.woody.2_sparc.deb
stable/main/source/libpng_1.0.12-3.woody.2.dsc
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-all/libgnupg-perl_0.9-1.woody.1_all.deb
stable/main/source/libgnupg-perl_0.9-1.woody.1.diff.gz
stable/main/source/libgnupg-perl_0.9-1.woody.1.dsc
libgnupg-perl (0.9-1.woody.1) stable; urgency=low
  * Upload to stable (for woody r1).
  * Moved from non-US to main (Section: interpreters).
    (apart from the changelog this package is identical to 0.9-2)


stable/main/binary-sparc/libgd-dev_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd1_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody2_sparc.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd1_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd-dev_1.8.4-17.woody2_s390.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-powerpc/libgd1_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody2_powerpc.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd1_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody2_mipsel.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd1_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd-dev_1.8.4-17.woody2_mips.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-m68k/libgd1_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd-dev_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody2_m68k.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd1_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd-dev_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody2_ia64.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-hppa/libgd1_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd-dev_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody2_hppa.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd1_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd-dev_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody2_arm.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-alpha/libgd1_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd-dev_1.8.4-17.woody2_alpha.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-i386/libgd-dev_1.8.4-17.woody2_i386.deb
stable/main/source/libgd_1.8.4-17.woody2.dsc
stable/main/binary-i386/libgd1_1.8.4-17.woody2_i386.deb
stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody2_i386.deb
stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody2_i386.deb
stable/main/source/libgd_1.8.4-17.woody2.diff.gz
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-sparc/l2tpd_0.67-1.1_sparc.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-s390/l2tpd_0.67-1.1_s390.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-powerpc/l2tpd_0.67-1.1_powerpc.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-mipsel/l2tpd_0.67-1.1_mipsel.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-mips/l2tpd_0.67-1.1_mips.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-ia64/l2tpd_0.67-1.1_ia64.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-i386/l2tpd_0.67-1.1_i386.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-hppa/l2tpd_0.67-1.1_hppa.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-arm/l2tpd_0.67-1.1_arm.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-alpha/l2tpd_0.67-1.1_alpha.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/source/l2tpd_0.67-1.1.dsc
stable/main/binary-m68k/l2tpd_0.67-1.1_m68k.deb
stable/main/source/l2tpd_0.67-1.1.diff.gz
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkadm55_1.2.4-5woody3_sparc.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-s390/libkrb5-dev_1.2.4-5woody3_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody3_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-admin-server_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-kdc_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody3_s390.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkrb53_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkadm55_1.2.4-5woody3_powerpc.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-mipsel/libkadm55_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-clients_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/libkrb53_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody3_mipsel.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-mips/libkrb53_1.2.4-5woody3_mips.deb
stable/main/binary-mips/libkadm55_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody3_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody3_mips.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-m68k/krb5-user_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-kdc_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody3_m68k.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-ia64/libkadm55_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/libkrb53_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody3_ia64.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-hppa/libkrb53_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/libkadm55_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-kdc_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody3_hppa.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-arm/krb5-telnetd_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-user_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-kdc_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-admin-server_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody3_arm.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-user_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody3_alpha.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-i386/krb5-clients_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody3_i386.deb
stable/main/binary-all/krb5-doc_1.2.4-5woody3_all.deb
stable/main/source/krb5_1.2.4-5woody3.dsc
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkrb53_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody3_i386.deb
stable/main/source/krb5_1.2.4-5woody3.diff.gz
stable/main/binary-i386/krb5-telnetd_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody3_i386.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/source/kernel-source-2.2.22_2.2.22-1.diff.gz
stable/main/source/kernel-source-2.2.22_2.2.22.orig.tar.gz
stable/main/binary-all/kernel-source-2.2.22_2.2.22-1_all.deb
stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1_all.deb
stable/main/source/kernel-source-2.2.22_2.2.22-1.dsc
kernel-source-2.2.22 (2.2.22-1) stable unstable; urgency=low
  * New upstream release.
  * Disabled MCE on Pentiums by default (closes: #154589).


stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody0_mips.deb
stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody0_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.dsc
stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0_all.deb
stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody0_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.tar.gz
stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody0_mips.deb
kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody0) stable; urgency=low
  * actually 2.4.19-0.020911.2 recompiled for woody (rediffed against
    kernel-source-2.4.19-4)


stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.diff.gz
stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1_all.deb
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.dsc
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1) stable; urgency=high
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.06.12).
    This patch fixes the DASD deadlock problem and some other severe
    problems.
  * Removed NMU DASD deadlock fix.
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.08.16).
    This patch fixes a problem related to the IUCV driver.


stable/main/binary-all/kernel-headers-2.4.19-sparc_26_all.deb
stable/main/source/kernel-image-sparc-2.4_26.tar.gz
stable/main/binary-sparc/kernel-image-2.4.19-sun4u_26_sparc.deb
stable/main/source/kernel-image-sparc-2.4_26.dsc
stable/main/binary-sparc/kernel-image-2.4.19-sun4u-smp_26_sparc.deb
kernel-image-sparc-2.4 (26) stable; urgency=low
  * More patches from davem, to fix serious bugs.
  * Strip kernel image so it fits better (makes SILO and TILO happy)


stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.1.1_s390.deb
stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1_s390.deb
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.dsc
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.tar.gz
kernel-image-2.4.17-s390 (2.4.17-2.woody.1.1) stable; urgency=high
  * NMU
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.06.12).
    This patch fixes the DASD deadlock problem and some other severe
    problems.
  * Removed NMU DASD deadlock fix.
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.08.16).
    This patch fixes a problem related to the IUCV driver.


stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-1_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-1_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.dsc
stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-1_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.tar.gz
stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-1_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-1_alpha.deb
kernel-image-2.2.22-alpha (2.2.22-1) stable unstable; urgency=low
  * New upstream release.


stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-s390/libarts_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.5_s390.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libkmid_2.2.2-13.woody.5_powerpc.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.5_mips.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-m68k/libkmid_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.5_m68k.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.5_ia64.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-i386/libarts_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid_2.2.2-13.woody.5_i386.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.5_hppa.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libarts_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.5_arm.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.5_alpha.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/source/kdelibs_2.2.2-13.woody.5.diff.gz
stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.5_mipsel.deb
stable/main/source/kdelibs_2.2.2-13.woody.5.dsc
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.5_all.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.5_mipsel.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-s390/kamera_2.2.2-6.8_s390.deb
stable/main/binary-s390/kcoloredit_2.2.2-6.8_s390.deb
stable/main/binary-s390/libkscan-dev_2.2.2-6.8_s390.deb
stable/main/binary-s390/kruler_2.2.2-6.8_s390.deb
stable/main/binary-s390/kghostview_2.2.2-6.8_s390.deb
stable/main/binary-s390/kpaint_2.2.2-6.8_s390.deb
stable/main/binary-s390/kooka_2.2.2-6.8_s390.deb
stable/main/binary-s390/libkscan1_2.2.2-6.8_s390.deb
stable/main/binary-s390/ksnapshot_2.2.2-6.8_s390.deb
stable/main/binary-s390/kiconedit_2.2.2-6.8_s390.deb
stable/main/binary-s390/kfract_2.2.2-6.8_s390.deb
stable/main/binary-s390/kview_2.2.2-6.8_s390.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-powerpc/kruler_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/libkscan1_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kamera_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kiconedit_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kghostview_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/ksnapshot_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/libkscan-dev_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kpaint_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kview_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kfract_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kcoloredit_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kooka_2.2.2-6.8_powerpc.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-mipsel/kamera_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kfract_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kiconedit_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kruler_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/libkscan1_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kcoloredit_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kooka_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kpaint_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kghostview_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/ksnapshot_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kview_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/libkscan-dev_2.2.2-6.8_mipsel.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    M|ller of KDE.


stable/main/binary-mips/kamera_2.2.2-6.8_mips.deb
stable/main/binary-mips/libkscan-dev_2.2.2-6.8_mips.deb
stable/main/binary-mips/kghostview_2.2.2-6.8_mips.deb
stable/main/binary-mips/kcoloredit_2.2.2-6.8_mips.deb
stable/main/binary-mips/kpaint_2.2.2-6.8_mips.deb
stable/main/binary-mips/kooka_2.2.2-6.8_mips.deb
stable/main/binary-mips/ksnapshot_2.2.2-6.8_mips.deb
stable/main/binary-mips/kfract_2.2.2-6.8_mips.deb
stable/main/binary-mips/kiconedit_2.2.2-6.8_mips.deb
stable/main/binary-mips/kruler_2.2.2-6.8_mips.deb
stable/main/binary-mips/libkscan1_2.2.2-6.8_mips.deb
stable/main/binary-mips/kview_2.2.2-6.8_mips.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-m68k/kcoloredit_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kview_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kamera_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/libkscan-dev_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kghostview_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kruler_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kfract_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/ksnapshot_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/libkscan1_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kooka_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kpaint_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kiconedit_2.2.2-6.8_m68k.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-ia64/kooka_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kpaint_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kcoloredit_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kiconedit_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/libkscan-dev_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kghostview_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kamera_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/libkscan1_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kruler_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/ksnapshot_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kview_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kfract_2.2.2-6.8_ia64.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-i386/kiconedit_2.2.2-6.8_i386.deb
stable/main/binary-i386/kfract_2.2.2-6.8_i386.deb
stable/main/binary-i386/libkscan1_2.2.2-6.8_i386.deb
stable/main/binary-i386/kooka_2.2.2-6.8_i386.deb
stable/main/binary-i386/kpaint_2.2.2-6.8_i386.deb
stable/main/binary-i386/kghostview_2.2.2-6.8_i386.deb
stable/main/binary-i386/libkscan-dev_2.2.2-6.8_i386.deb
stable/main/binary-i386/ksnapshot_2.2.2-6.8_i386.deb
stable/main/binary-i386/kruler_2.2.2-6.8_i386.deb
stable/main/binary-i386/kcoloredit_2.2.2-6.8_i386.deb
stable/main/binary-i386/kview_2.2.2-6.8_i386.deb
stable/main/binary-i386/kamera_2.2.2-6.8_i386.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-hppa/kfract_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kamera_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kcoloredit_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kpaint_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/ksnapshot_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kghostview_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kview_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kruler_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kiconedit_2.2.2-6.8_hppa.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-arm/kooka_2.2.2-6.8_arm.deb
stable/main/binary-arm/libkscan1_2.2.2-6.8_arm.deb
stable/main/binary-arm/ksnapshot_2.2.2-6.8_arm.deb
stable/main/binary-arm/kpaint_2.2.2-6.8_arm.deb
stable/main/binary-arm/kghostview_2.2.2-6.8_arm.deb
stable/main/binary-arm/kcoloredit_2.2.2-6.8_arm.deb
stable/main/binary-arm/kiconedit_2.2.2-6.8_arm.deb
stable/main/binary-arm/kruler_2.2.2-6.8_arm.deb
stable/main/binary-arm/libkscan-dev_2.2.2-6.8_arm.deb
stable/main/binary-arm/kfract_2.2.2-6.8_arm.deb
stable/main/binary-arm/kview_2.2.2-6.8_arm.deb
stable/main/binary-arm/kamera_2.2.2-6.8_arm.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-alpha/kview_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kamera_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kghostview_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kruler_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kiconedit_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kooka_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kpaint_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/ksnapshot_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/libkscan-dev_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kcoloredit_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/libkscan1_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kfract_2.2.2-6.8_alpha.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-sparc/libkscan-dev_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kfract_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kview_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kiconedit_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/ksnapshot_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kamera_2.2.2-6.8_sparc.deb
stable/main/source/kdegraphics_2.2.2-6.8.dsc
stable/main/binary-sparc/kcoloredit_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kruler_2.2.2-6.8_sparc.deb
stable/main/source/kdegraphics_2.2.2-6.8.diff.gz
stable/main/binary-sparc/kghostview_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kpaint_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kooka_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/libkscan1_2.2.2-6.8_sparc.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-s390/irssi-text_0.8.4-3.1_s390.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-powerpc/irssi-text_0.8.4-3.1_powerpc.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-mipsel/irssi-text_0.8.4-3.1_mipsel.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-mips/irssi-text_0.8.4-3.1_mips.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-m68k/irssi-text_0.8.4-3.1_m68k.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-ia64/irssi-text_0.8.4-3.1_ia64.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-i386/irssi-text_0.8.4-3.1_i386.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-hppa/irssi-text_0.8.4-3.1_hppa.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-arm/irssi-text_0.8.4-3.1_arm.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-alpha/irssi-text_0.8.4-3.1_alpha.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/source/irssi-text_0.8.4-3.1.diff.gz
stable/main/binary-sparc/irssi-text_0.8.4-3.1_sparc.deb
stable/main/source/irssi-text_0.8.4-3.1.dsc
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.1_sparc.deb
stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_sparc.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.1_s390.deb
stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.1_s390.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.1_powerpc.deb
stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.1_mipsel.deb
stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb
stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.1_mips.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.1_m68k.deb
stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.1_ia64.deb
stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb
stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.1_hppa.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb
stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.1_arm.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb
stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.1_alpha.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/source/interchange_4.8.3.20020306-1.woody.1.dsc
stable/main/source/interchange_4.8.3.20020306-1.woody.1.diff.gz
stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.1_all.deb
stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.1_i386.deb
stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb
stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-all/initrd-tools_0.1.32woody.3_all.deb
stable/main/source/initrd-tools_0.1.32woody.3.dsc
stable/main/source/initrd-tools_0.1.32woody.3.tar.gz
initrd-tools (0.1.32woody.3) stable; urgency=low
  * Depend on debhelper >= 3 (closes: #171364).


stable/main/source/im_141-18.2.dsc
stable/main/binary-all/im_141-18.2_all.deb
stable/main/source/im_141-18.2.diff.gz
im (1:141-18.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Fixed yafhci386 that turned out to be yafhc$build_arch


stable/main/binary-s390/hylafax-server_4.1.1-1.1_s390.deb
stable/main/binary-s390/hylafax-client_4.1.1-1.1_s390.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-powerpc/hylafax-server_4.1.1-1.1_powerpc.deb
stable/main/binary-powerpc/hylafax-client_4.1.1-1.1_powerpc.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-m68k/hylafax-client_4.1.1-1.1_m68k.deb
stable/main/binary-m68k/hylafax-server_4.1.1-1.1_m68k.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-ia64/hylafax-server_4.1.1-1.1_ia64.deb
stable/main/binary-ia64/hylafax-client_4.1.1-1.1_ia64.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-i386/hylafax-server_4.1.1-1.1_i386.deb
stable/main/binary-i386/hylafax-client_4.1.1-1.1_i386.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-hppa/hylafax-server_4.1.1-1.1_hppa.deb
stable/main/binary-hppa/hylafax-client_4.1.1-1.1_hppa.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-arm/hylafax-client_4.1.1-1.1_arm.deb
stable/main/binary-arm/hylafax-server_4.1.1-1.1_arm.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-alpha/hylafax-client_4.1.1-1.1_alpha.deb
stable/main/binary-alpha/hylafax-server_4.1.1-1.1_alpha.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-all/hylafax-doc_4.1.1-1.1_all.deb
stable/main/source/hylafax_4.1.1-1.1.diff.gz
stable/main/source/hylafax_4.1.1-1.1.dsc
stable/main/binary-sparc/hylafax-client_4.1.1-1.1_sparc.deb
stable/main/binary-sparc/hylafax-server_4.1.1-1.1_sparc.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-hppa/htmldoc_1.8.17-2_hppa.deb
htmldoc (1.8.17-2) woody-proposed-updates; urgency=high
  * Fixed bug in configure.in; --without-openssl-* wasn't recognized.
    Considered high priority because the previous version of htmldoc is
    linked against OpenSSL because of this bug, which is a violation of
    the GPL.


stable/main/binary-all/html2ps_1.0b3-1.2_all.deb
stable/main/source/html2ps_1.0b3-1.2.dsc
stable/main/source/html2ps_1.0b3-1.2.diff.gz
html2ps (1.0b3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a trivial syntax error introduced in 1.0b3-1.1 (Closes: #170272)


stable/main/binary-s390/htcheck_1.1-1.1_s390.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-powerpc/htcheck_1.1-1.1_powerpc.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-mipsel/htcheck_1.1-1.1_mipsel.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-mips/htcheck_1.1-1.1_mips.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-m68k/htcheck_1.1-1.1_m68k.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-ia64/htcheck_1.1-1.1_ia64.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-i386/htcheck_1.1-1.1_i386.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-hppa/htcheck_1.1-1.1_hppa.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-arm/htcheck_1.1-1.1_arm.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-alpha/htcheck_1.1-1.1_alpha.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-sparc/htcheck_1.1-1.1_sparc.deb
stable/main/source/htcheck_1.1-1.1.dsc
stable/main/source/htcheck_1.1-1.1.diff.gz
stable/main/binary-all/htcheck-php_1.1-1.1_all.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-s390/libstonith0_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/libstonith-dev_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/heartbeat_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/stonith_0.4.9.0l-7.2_s390.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-powerpc/stonith_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/libstonith-dev_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/heartbeat_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/libstonith0_0.4.9.0l-7.2_powerpc.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-mipsel/libstonith-dev_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/heartbeat_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/libstonith0_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/stonith_0.4.9.0l-7.2_mipsel.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-mips/libstonith0_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/stonith_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/heartbeat_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/libstonith-dev_0.4.9.0l-7.2_mips.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-m68k/heartbeat_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/stonith_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/libstonith0_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/libstonith-dev_0.4.9.0l-7.2_m68k.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-ia64/stonith_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/libstonith0_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/heartbeat_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/libstonith-dev_0.4.9.0l-7.2_ia64.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-i386/libstonith-dev_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/heartbeat_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/stonith_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/libstonith0_0.4.9.0l-7.2_i386.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-hppa/libstonith0_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/stonith_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/heartbeat_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/libstonith-dev_0.4.9.0l-7.2_hppa.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-arm/libstonith0_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/heartbeat_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/stonith_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/libstonith-dev_0.4.9.0l-7.2_arm.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-alpha/libstonith-dev_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/libstonith0_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/stonith_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/heartbeat_0.4.9.0l-7.2_alpha.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-sparc/heartbeat_0.4.9.0l-7.2_sparc.deb
stable/main/binary-all/ldirectord_0.4.9.0l-7.2_all.deb
stable/main/binary-sparc/stonith_0.4.9.0l-7.2_sparc.deb
stable/main/source/heartbeat_0.4.9.0l-7.2.diff.gz
stable/main/binary-sparc/libstonith0_0.4.9.0l-7.2_sparc.deb
stable/main/binary-sparc/libstonith-dev_0.4.9.0l-7.2_sparc.deb
stable/main/source/heartbeat_0.4.9.0l-7.2.dsc
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-s390/gv_3.5.8-26.1_s390.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-powerpc/gv_3.5.8-26.1_powerpc.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-mipsel/gv_3.5.8-26.1_mipsel.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-mips/gv_3.5.8-26.1_mips.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-m68k/gv_3.5.8-26.1_m68k.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-ia64/gv_3.5.8-26.1_ia64.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-i386/gv_3.5.8-26.1_i386.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-hppa/gv_3.5.8-26.1_hppa.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-arm/gv_3.5.8-26.1_arm.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-alpha/gv_3.5.8-26.1_alpha.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/source/gv_3.5.8-26.1.diff.gz
stable/main/binary-sparc/gv_3.5.8-26.1_sparc.deb
stable/main/source/gv_3.5.8-26.1.dsc
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-sparc/gtetrinet_0.4.1-9woody1.1_sparc.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-s390/gtetrinet_0.4.1-9woody1.1_s390.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-powerpc/gtetrinet_0.4.1-9woody1.1_powerpc.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-mipsel/gtetrinet_0.4.1-9woody1.1_mipsel.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-mips/gtetrinet_0.4.1-9woody1.1_mips.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-m68k/gtetrinet_0.4.1-9woody1.1_m68k.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-ia64/gtetrinet_0.4.1-9woody1.1_ia64.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-hppa/gtetrinet_0.4.1-9woody1.1_hppa.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-arm/gtetrinet_0.4.1-9woody1.1_arm.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-alpha/gtetrinet_0.4.1-9woody1.1_alpha.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/source/gtetrinet_0.4.1-9woody1.1.dsc
stable/main/binary-i386/gtetrinet_0.4.1-9woody1.1_i386.deb
stable/main/source/gtetrinet_0.4.1-9woody1.1.diff.gz
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends
gtetrinet (0.4.1-9woody1) stable-security; urgency=HIGH
  * Apply patch from James Antill to fix multiple buffer overflows
    (Buqtraq ID: 6062).


stable/main/binary-sparc/gnome-pim-conduits_1.4.6-1woody1_sparc.deb
stable/main/binary-sparc/gnome-pim_1.4.6-1woody1_sparc.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-s390/gnome-pim-conduits_1.4.6-1woody1_s390.deb
stable/main/binary-s390/gnome-pim_1.4.6-1woody1_s390.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-powerpc/gnome-pim_1.4.6-1woody1_powerpc.deb
stable/main/binary-powerpc/gnome-pim-conduits_1.4.6-1woody1_powerpc.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-mipsel/gnome-pim-conduits_1.4.6-1woody1_mipsel.deb
stable/main/binary-mipsel/gnome-pim_1.4.6-1woody1_mipsel.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-mips/gnome-pim-conduits_1.4.6-1woody1_mips.deb
stable/main/binary-mips/gnome-pim_1.4.6-1woody1_mips.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-m68k/gnome-pim_1.4.6-1woody1_m68k.deb
stable/main/binary-m68k/gnome-pim-conduits_1.4.6-1woody1_m68k.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-ia64/gnome-pim-conduits_1.4.6-1woody1_ia64.deb
stable/main/binary-ia64/gnome-pim_1.4.6-1woody1_ia64.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-hppa/gnome-pim-conduits_1.4.6-1woody1_hppa.deb
stable/main/binary-hppa/gnome-pim_1.4.6-1woody1_hppa.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-arm/gnome-pim_1.4.6-1woody1_arm.deb
stable/main/binary-arm/gnome-pim-conduits_1.4.6-1woody1_arm.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-alpha/gnome-pim_1.4.6-1woody1_alpha.deb
stable/main/binary-alpha/gnome-pim-conduits_1.4.6-1woody1_alpha.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-i386/gnome-pim_1.4.6-1woody1_i386.deb
stable/main/source/gnome-pim_1.4.6-1woody1.diff.gz
stable/main/source/gnome-pim_1.4.6-1woody1.dsc
stable/main/binary-i386/gnome-pim-conduits_1.4.6-1woody1_i386.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-s390/gnome-gv_1.1.96-3.1_s390.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-powerpc/gnome-gv_1.1.96-3.1_powerpc.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-mipsel/gnome-gv_1.1.96-3.1_mipsel.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-mips/gnome-gv_1.1.96-3.1_mips.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-m68k/gnome-gv_1.1.96-3.1_m68k.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-ia64/gnome-gv_1.1.96-3.1_ia64.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-i386/gnome-gv_1.1.96-3.1_i386.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-hppa/gnome-gv_1.1.96-3.1_hppa.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-arm/gnome-gv_1.1.96-3.1_arm.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-alpha/gnome-gv_1.1.96-3.1_alpha.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/source/gnome-gv_1.1.96-3.1.diff.gz
stable/main/binary-sparc/gnome-gv_1.1.96-3.1_sparc.deb
stable/main/source/gnome-gv_1.1.96-3.1.dsc
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-sparc/libc6-prof_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-sparc64_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-pic_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dbg_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/nscd_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dev_2.2.5-11.2_sparc.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-s390/libc6-pic_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-dev_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-prof_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-dbg_2.2.5-11.2_s390.deb
stable/main/binary-s390/nscd_2.2.5-11.2_s390.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-powerpc/libc6_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-dbg_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-pic_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-prof_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-dev_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/nscd_2.2.5-11.2_powerpc.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-mipsel/libc6-prof_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/nscd_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-dev_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-pic_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-dbg_2.2.5-11.2_mipsel.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-mips/libc6-dev_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-prof_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-dbg_2.2.5-11.2_mips.deb
stable/main/binary-mips/nscd_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-pic_2.2.5-11.2_mips.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-ia64/libc6.1_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-prof_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-dev_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-pic_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/nscd_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.2_ia64.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-i386/libc6-prof_2.2.5-11.2_i386.deb
stable/main/binary-i386/nscd_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-dev_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-pic_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-dbg_2.2.5-11.2_i386.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-hppa/libc6-dev_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/nscd_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-dbg_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-prof_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-pic_2.2.5-11.2_hppa.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-arm/libc6-prof_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-dbg_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-pic_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-dev_2.2.5-11.2_arm.deb
stable/main/binary-arm/nscd_2.2.5-11.2_arm.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-alpha/nscd_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-pic_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-dev_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-prof_2.2.5-11.2_alpha.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-all/locales_2.2.5-11.2_all.deb
stable/main/binary-m68k/libc6-dbg_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6-prof_2.2.5-11.2_m68k.deb
stable/main/binary-all/glibc-doc_2.2.5-11.2_all.deb
stable/main/binary-m68k/libc6-dev_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6-pic_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/nscd_2.2.5-11.2_m68k.deb
stable/main/source/glibc_2.2.5-11.2.dsc
stable/main/source/glibc_2.2.5-11.2.diff.gz
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-s390/g++-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/protoize-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gobjc-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-dbg_2.95.4-11woody1_s390.deb
stable/main/binary-s390/cpp-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gcc-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-dev_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-glibc2.2_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-dev_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-dbg_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_s390.deb
stable/main/binary-s390/chill-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/g77-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gpc-2.95_2.95.4-11woody1_s390.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-powerpc/libg++2.8.1.3-dbg_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gcc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-glibc2.2_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gpc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gobjc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gcc-2.95-nof_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-dev_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/chill-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/g++-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/cpp-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libg++2.8.1.3-dev_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/g77-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-dbg_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/protoize-2.95_2.95.4-11woody1_powerpc.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-m68k/chill-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-dev_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/protoize-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gobjc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/cpp-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-dbg_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gcc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gpc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-dbg_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-glibc2.2_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/g77-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-dev_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/g++-2.95_2.95.4-11woody1_m68k.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-arm/g77-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gobjc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/chill-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gcc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-dev_2.95.4-11woody1_arm.deb
stable/main/binary-arm/cpp-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-dev_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-dbg_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-dbg_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gpc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/g++-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/protoize-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-glibc2.2_2.95.4-11woody1_arm.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-alpha/libstdc++2.10-dbg_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/g++-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gpc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libstdc++2.10-dev_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gobjc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libstdc++2.10-glibc2.2_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/cpp-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-dev_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gcc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-dbg_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/g77-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/protoize-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/chill-2.95_2.95.4-11woody1_alpha.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-i386/g77-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/gcc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/gpc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-all/gcc-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/protoize-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-all/cpp-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/gobjc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libg++2.8.1.3-dev_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libstdc++2.10-dev_2.95.4-11woody1_i386.deb
stable/main/binary-i386/cpp-2.95_2.95.4-11woody1_i386.deb
stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.diff.gz
stable/main/binary-all/gpc-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/libg++2.8.1.3-dbg_2.95.4-11woody1_i386.deb
stable/main/binary-all/g77-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/libstdc++2.10-glibc2.2_2.95.4-11woody1_i386.deb
stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.dsc
stable/main/binary-i386/libstdc++2.10-dbg_2.95.4-11woody1_i386.deb
stable/main/binary-i386/g++-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_i386.deb
stable/main/binary-i386/chill-2.95_2.95.4-11woody1_i386.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/source/gallery_1.2.5-7.woody.0.diff.gz
stable/main/source/gallery_1.2.5-7.woody.0.dsc
stable/main/binary-all/gallery_1.2.5-7.woody.0_all.deb
gallery (1.2.5-7.woody.0) stable-security; urgency=high
  * SECURITY: fix from upstream CVS to stop remote command execution through
    $GALLERY_BASEDIR var.


stable/main/binary-s390/gaim-common_0.58-2.3_s390.deb
stable/main/binary-s390/gaim_0.58-2.3_s390.deb
stable/main/binary-s390/gaim-gnome_0.58-2.3_s390.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-powerpc/gaim_0.58-2.3_powerpc.deb
stable/main/binary-powerpc/gaim-gnome_0.58-2.3_powerpc.deb
stable/main/binary-powerpc/gaim-common_0.58-2.3_powerpc.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-mipsel/gaim-common_0.58-2.3_mipsel.deb
stable/main/binary-mipsel/gaim_0.58-2.3_mipsel.deb
stable/main/binary-mipsel/gaim-gnome_0.58-2.3_mipsel.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-mips/gaim_0.58-2.3_mips.deb
stable/main/binary-mips/gaim-common_0.58-2.3_mips.deb
stable/main/binary-mips/gaim-gnome_0.58-2.3_mips.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-m68k/gaim-common_0.58-2.3_m68k.deb
stable/main/binary-m68k/gaim_0.58-2.3_m68k.deb
stable/main/binary-m68k/gaim-gnome_0.58-2.3_m68k.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-ia64/gaim-gnome_0.58-2.3_ia64.deb
stable/main/binary-ia64/gaim_0.58-2.3_ia64.deb
stable/main/binary-ia64/gaim-common_0.58-2.3_ia64.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-i386/gaim-gnome_0.58-2.3_i386.deb
stable/main/binary-i386/gaim-common_0.58-2.3_i386.deb
stable/main/binary-i386/gaim_0.58-2.3_i386.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-hppa/gaim-gnome_0.58-2.3_hppa.deb
stable/main/binary-hppa/gaim_0.58-2.3_hppa.deb
stable/main/binary-hppa/gaim-common_0.58-2.3_hppa.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-arm/gaim-common_0.58-2.3_arm.deb
stable/main/binary-arm/gaim-gnome_0.58-2.3_arm.deb
stable/main/binary-arm/gaim_0.58-2.3_arm.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-alpha/gaim-common_0.58-2.3_alpha.deb
stable/main/binary-alpha/gaim-gnome_0.58-2.3_alpha.deb
stable/main/binary-alpha/gaim_0.58-2.3_alpha.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/source/gaim_0.58-2.3.diff.gz
stable/main/binary-sparc/gaim-common_0.58-2.3_sparc.deb
stable/main/binary-sparc/gaim_0.58-2.3_sparc.deb
stable/main/source/gaim_0.58-2.3.dsc
stable/main/binary-sparc/gaim-gnome_0.58-2.3_sparc.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-s390/fetchmail-ssl_5.9.11-6.1_s390.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.1_powerpc.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.1_mipsel.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mips/fetchmail-ssl_5.9.11-6.1_mips.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.1_m68k.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.1_ia64.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-i386/fetchmail-ssl_5.9.11-6.1_i386.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.1_hppa.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-arm/fetchmail-ssl_5.9.11-6.1_arm.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.1_alpha.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/source/fetchmail-ssl_5.9.11-6.1.dsc
stable/main/source/fetchmail-ssl_5.9.11-6.1.diff.gz
stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.1_sparc.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-s390/fetchmail_5.9.11-6.1_s390.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-powerpc/fetchmail_5.9.11-6.1_powerpc.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mipsel/fetchmail_5.9.11-6.1_mipsel.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mips/fetchmail_5.9.11-6.1_mips.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-m68k/fetchmail_5.9.11-6.1_m68k.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-ia64/fetchmail_5.9.11-6.1_ia64.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-i386/fetchmail_5.9.11-6.1_i386.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-hppa/fetchmail_5.9.11-6.1_hppa.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-arm/fetchmail_5.9.11-6.1_arm.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-alpha/fetchmail_5.9.11-6.1_alpha.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-all/fetchmailconf_5.9.11-6.1_all.deb
stable/main/source/fetchmail_5.9.11-6.1.dsc
stable/main/binary-sparc/fetchmail_5.9.11-6.1_sparc.deb
stable/main/binary-all/fetchmail-common_5.9.11-6.1_all.deb
stable/main/source/fetchmail_5.9.11-6.1.diff.gz
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-s390/fam_2.6.6.1-5.2_s390.deb
stable/main/binary-s390/libfam-dev_2.6.6.1-5.2_s390.deb
stable/main/binary-s390/libfam0_2.6.6.1-5.2_s390.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-powerpc/libfam-dev_2.6.6.1-5.2_powerpc.deb
stable/main/binary-powerpc/fam_2.6.6.1-5.2_powerpc.deb
stable/main/binary-powerpc/libfam0_2.6.6.1-5.2_powerpc.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-mipsel/fam_2.6.6.1-5.2_mipsel.deb
stable/main/binary-mipsel/libfam-dev_2.6.6.1-5.2_mipsel.deb
stable/main/binary-mipsel/libfam0_2.6.6.1-5.2_mipsel.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-mips/libfam-dev_2.6.6.1-5.2_mips.deb
stable/main/binary-mips/libfam0_2.6.6.1-5.2_mips.deb
stable/main/binary-mips/fam_2.6.6.1-5.2_mips.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-m68k/libfam0_2.6.6.1-5.2_m68k.deb
stable/main/binary-m68k/libfam-dev_2.6.6.1-5.2_m68k.deb
stable/main/binary-m68k/fam_2.6.6.1-5.2_m68k.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-ia64/fam_2.6.6.1-5.2_ia64.deb
stable/main/binary-ia64/libfam0_2.6.6.1-5.2_ia64.deb
stable/main/binary-ia64/libfam-dev_2.6.6.1-5.2_ia64.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-i386/fam_2.6.6.1-5.2_i386.deb
stable/main/binary-i386/libfam0_2.6.6.1-5.2_i386.deb
stable/main/binary-i386/libfam-dev_2.6.6.1-5.2_i386.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-hppa/libfam-dev_2.6.6.1-5.2_hppa.deb
stable/main/binary-hppa/libfam0_2.6.6.1-5.2_hppa.deb
stable/main/binary-hppa/fam_2.6.6.1-5.2_hppa.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-arm/fam_2.6.6.1-5.2_arm.deb
stable/main/binary-arm/libfam0_2.6.6.1-5.2_arm.deb
stable/main/binary-arm/libfam-dev_2.6.6.1-5.2_arm.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-alpha/libfam0_2.6.6.1-5.2_alpha.deb
stable/main/binary-alpha/libfam-dev_2.6.6.1-5.2_alpha.deb
stable/main/binary-alpha/fam_2.6.6.1-5.2_alpha.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-sparc/libfam-dev_2.6.6.1-5.2_sparc.deb
stable/main/source/fam_2.6.6.1-5.2.diff.gz
stable/main/binary-sparc/libfam0_2.6.6.1-5.2_sparc.deb
stable/main/binary-sparc/fam_2.6.6.1-5.2_sparc.deb
stable/main/source/fam_2.6.6.1-5.2.dsc
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-s390/ethereal-common_0.9.4-1woody2_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody2_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody2_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody2_s390.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-powerpc/ethereal_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody2_powerpc.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-mipsel/ethereal-common_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/tethereal_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody2_mipsel.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-mips/ethereal-dev_0.9.4-1woody2_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody2_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody2_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody2_mips.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-m68k/ethereal-dev_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/ethereal_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody2_m68k.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-ia64/tethereal_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody2_ia64.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-i386/ethereal_0.9.4-1woody2_i386.deb
stable/main/binary-i386/ethereal-common_0.9.4-1woody2_i386.deb
stable/main/binary-i386/tethereal_0.9.4-1woody2_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody2_i386.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-hppa/ethereal-common_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody2_hppa.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-arm/ethereal-common_0.9.4-1woody2_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody2_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody2_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody2_arm.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-alpha/ethereal-dev_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody2_alpha.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-sparc/ethereal_0.9.4-1woody2_sparc.deb
stable/main/binary-sparc/ethereal-dev_0.9.4-1woody2_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody2_sparc.deb
stable/main/source/ethereal_0.9.4-1woody2.dsc
stable/main/binary-sparc/tethereal_0.9.4-1woody2_sparc.deb
stable/main/source/ethereal_0.9.4-1woody2.diff.gz
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/source/eroaster_2.1.0.0.3-2.dsc
stable/main/binary-all/eroaster_2.1.0.0.3-2_all.deb
stable/main/source/eroaster_2.1.0.0.3-2.diff.gz
eroaster (2.1.0.0.3-2) stable; urgency=low
  * Fixed a typo that broke image creation with mkisofs if only the image
    was being created, ie if not part of create image/burn operation
    (closes: #170277)


stable/main/source/epic4-script-light_2.7.30p5-1.1.diff.gz
stable/main/binary-all/epic4-script-light_2.7.30p5-1.1_all.deb
stable/main/source/epic4-script-light_2.7.30p5-1.1.dsc
epic4-script-light (1:2.7.30p5-1.1) stable-security; urgency=high
  * Non-maintainer upload by Security team
  * Security update for stable which fixes double evaluation of $-expandos
    in dangerous cases.
  * Applied upstream fix for brokenly fixed double evaluation of
    $-expandos in nickname and channel name when zapping


stable/main/binary-alpha/elk_3.0-8.1_alpha.deb
elk (3.0-8.1) unstable; urgency=low
  * NMU.
  * Added missing build dependencies (closes: #109854, #116532).
  * Fix menu item (closes: #121004).
  * Apply patch to make package lintian clean (closes: #126987).
  * src/build: include debian/arch-config to specify build flags for
    the alpha (-O0). May fix #59893.


stable/main/source/docbook-xml-slides_1.1-2.1woody2.dsc
stable/main/source/docbook-xml-slides_1.1-2.1woody2.diff.gz
stable/main/binary-all/docbook-xml-slides_1.1-2.1woody2_all.deb
docbook-xml-slides (1.1-2.1woody2) stable; urgency=low
  * Really upload to woody.
docbook-xml-slides (1.1-2.1woody1) unstable; urgency=low
  * Non-maintainer upload.
  * Backported to woody.
docbook-xml-slides (1.1-2.2) unstable; urgency=medium
  * Non-maintainer upload
  * Fixed dependency, so that this package can coexist with others
    (Closes: #157398).  This should have been done long ago, I'll be
    preparing a version for woody as well - I already had to rebuild this
    package twice, and already explained to other people on IRC how to do
    that themselves.
  * Use Build-depends-indep, not just build-depends, as lintian noticed.


stable/main/binary-powerpc/dietlibc-dev_0.12-2.4_powerpc.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-mipsel/dietlibc-dev_0.12-2.4_mipsel.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-mips/dietlibc-dev_0.12-2.4_mips.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-i386/dietlibc-dev_0.12-2.4_i386.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-arm/dietlibc-dev_0.12-2.4_arm.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-alpha/dietlibc-dev_0.12-2.4_alpha.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/source/dietlibc_0.12-2.4.diff.gz
stable/main/binary-all/dietlibc-doc_0.12-2.4_all.deb
stable/main/binary-sparc/dietlibc-dev_0.12-2.4_sparc.deb
stable/main/source/dietlibc_0.12-2.4.dsc
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/source/defrag_0.73pjm1-1.woody.0.dsc
stable/main/binary-i386/defrag_0.73pjm1-1.woody.0_i386.deb
stable/main/source/defrag_0.73pjm1-1.woody.0.diff.gz
defrag (0.73pjm1-1.woody.0) stable; urgency=high
  * debian/control: fixed speling erorr in package description (closes: #124541)
  * debian/copyright: fixed mis-spelling common-licences -> common-licenses
  * ext2.c: Gracefully fail on filesystems with journals (closes: #118635).
    This fixes a bug that causes filesystem corruption when defrag is run on
    ext3 filesystems.


stable/main/source/debiandoc-sgml_1.1.67woody1.dsc
stable/main/source/debiandoc-sgml_1.1.67woody1.tar.gz
stable/main/binary-all/debiandoc-sgml_1.1.67woody1_all.deb
debiandoc-sgml (1.1.67woody1) stable; urgency=low
  * debian/postinst: added invocation of 'install-sgmlcatalog --remove
    debiandoc-sgml' to clean up cruft potentially left over from the SGML
    catalog transition in a potato -> woody upgrade
    (closes: Bug#154737)


stable/main/source/cron-apt_0.0.6woody1.tar.gz
stable/main/source/cron-apt_0.0.6woody1.dsc
stable/main/binary-all/cron-apt_0.0.6woody1_all.deb
cron-apt (0.0.6woody1) stable; urgency=high
  * Added default path so the upgrade will work fine. Thanks to Donovan
    Baarda <abo@minkirri.apana.org.au> for pointing out the problem.
    Closes: #158869.
    This is a backport from version 0.0.7 which has been tested for a couple
    of months without any reports of failure.


stable/main/binary-sparc/courier-mta_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-debug_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-authmysql_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-pop_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-webadmin_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-maildrop_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-base_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/sqwebmail_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-imap_1.4.3-2.3_sparc.deb
stable/main/binary-sparc/courier-mlm_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-authdaemon_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-pcp_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-ldap_0.37.3-2.3_sparc.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/courier-maildrop_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-ldap_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-imap_1.4.3-2.3_s390.deb
stable/main/binary-s390/courier-authdaemon_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-pop_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-pcp_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-webadmin_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-authmysql_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-mta_0.37.3-2.3_s390.deb
stable/main/binary-s390/sqwebmail_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-mlm_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-debug_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-base_0.37.3-2.3_s390.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/courier-pcp_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-webadmin_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-pop_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-maildrop_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/sqwebmail_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-base_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-ldap_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-authmysql_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-imap_1.4.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-mlm_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-mta_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-debug_0.37.3-2.3_powerpc.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/courier-authmysql_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-imap_1.4.3-2.3_mips.deb
stable/main/binary-mips/courier-pop_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-webadmin_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-maildrop_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-ldap_0.37.3-2.3_mips.deb
stable/main/binary-mips/sqwebmail_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-mlm_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-pcp_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-mta_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-base_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-debug_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-authdaemon_0.37.3-2.3_mips.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/courier-authmysql_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-ldap_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-webadmin_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-imap_1.4.3-2.3_m68k.deb
stable/main/binary-m68k/courier-maildrop_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-base_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-authdaemon_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-pcp_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-debug_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/sqwebmail_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-mta_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-mlm_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-pop_0.37.3-2.3_m68k.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/courier-imap_1.4.3-2.3_ia64.deb
stable/main/binary-ia64/courier-authdaemon_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-pop_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-authmysql_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-base_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-ldap_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-pcp_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-mta_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-maildrop_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-debug_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-mlm_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/sqwebmail_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-webadmin_0.37.3-2.3_ia64.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/courier-base_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-mta_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-authdaemon_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-webadmin_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-pop_0.37.3-2.3_i386.deb
stable/main/binary-i386/sqwebmail_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-imap_1.4.3-2.3_i386.deb
stable/main/binary-i386/courier-maildrop_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-mlm_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-debug_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-authmysql_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-ldap_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-pcp_0.37.3-2.3_i386.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/courier-base_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-webadmin_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-pop_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-mta_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-maildrop_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-imap_1.4.3-2.3_hppa.deb
stable/main/binary-hppa/courier-authdaemon_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-mlm_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/sqwebmail_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-ldap_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-pcp_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-debug_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-authmysql_0.37.3-2.3_hppa.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/courier-debug_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-ldap_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-authmysql_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-base_0.37.3-2.3_arm.deb
stable/main/binary-arm/sqwebmail_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-imap_1.4.3-2.3_arm.deb
stable/main/binary-arm/courier-maildrop_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-mlm_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-pop_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-webadmin_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-pcp_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-authdaemon_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-mta_0.37.3-2.3_arm.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/courier-mta_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-maildrop_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-authdaemon_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-authmysql_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-webadmin_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/sqwebmail_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-imap_1.4.3-2.3_alpha.deb
stable/main/binary-alpha/courier-ldap_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-mlm_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-pcp_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-pop_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-debug_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-base_0.37.3-2.3_alpha.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/courier-ldap_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-imap_1.4.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-maildrop_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-mlm_0.37.3-2.3_mipsel.deb
stable/main/binary-all/courier-doc_0.37.3-2.3_all.deb
stable/main/binary-mipsel/courier-webadmin_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-pop_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-pcp_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-authmysql_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-mta_0.37.3-2.3_mipsel.deb
stable/main/source/courier_0.37.3-2.3.dsc
stable/main/binary-mipsel/sqwebmail_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-base_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-debug_0.37.3-2.3_mipsel.deb
stable/main/source/courier_0.37.3-2.3.diff.gz
stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.3_mipsel.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-all/bugzilla-doc_2.14.2-0woody2_all.deb
stable/main/source/bugzilla_2.14.2-0woody2.dsc
stable/main/binary-all/bugzilla_2.14.2-0woody2_all.deb
stable/main/source/bugzilla_2.14.2-0woody2.diff.gz
bugzilla (2.14.2-0woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed bit handling for new products to avoid errors in group handling
    triggered by not exact Perl maths beyond 2^48.  Backport from new
    upstream 2.14.4.


stable/main/binary-sparc/bastille_1.3.0-2.1_sparc.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-s390/bastille_1.3.0-2.1_s390.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-powerpc/bastille_1.3.0-2.1_powerpc.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mipsel/bastille_1.3.0-2.1_mipsel.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mips/bastille_1.3.0-2.1_mips.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-m68k/bastille_1.3.0-2.1_m68k.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-ia64/bastille_1.3.0-2.1_ia64.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-hppa/bastille_1.3.0-2.1_hppa.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-arm/bastille_1.3.0-2.1_arm.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-alpha/bastille_1.3.0-2.1_alpha.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/source/bastille_1.3.0-2.1.dsc
stable/main/binary-i386/bastille_1.3.0-2.1_i386.deb
stable/main/source/bastille_1.3.0-2.1.diff.gz
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mips/arcboot_0.3.3.9.woody.0_mips.deb
stable/main/source/arcboot_0.3.3.9.woody.0.dsc
stable/main/source/arcboot_0.3.3.9.woody.0.tar.gz
stable/main/binary-mips/tip22_0.3.3.9.woody.0_mips.deb
arcboot (0.3.3.9.woody.0) stable; urgency=medium
  * recompile 0.3.4 for Woody r1:
     - fix loader crashes on extfs errors
     - add tip22 (piggyback style tftp loader) needed by boot floppies
       for kernels newer then 2.4.16
  * disable debugging output


stable/main/binary-s390/apache-ssl_1.3.26.1+1.48-0woody3_s390.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-ssl_1.3.26.1+1.48-0woody3_powerpc.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache-ssl_1.3.26.1+1.48-0woody3_mipsel.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache-ssl_1.3.26.1+1.48-0woody3_mips.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-ssl_1.3.26.1+1.48-0woody3_m68k.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache-ssl_1.3.26.1+1.48-0woody3_ia64.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-ssl_1.3.26.1+1.48-0woody3_i386.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-ssl_1.3.26.1+1.48-0woody3_hppa.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-ssl_1.3.26.1+1.48-0woody3_arm.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache-ssl_1.3.26.1+1.48-0woody3_alpha.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.diff.gz
stable/main/binary-sparc/apache-ssl_1.3.26.1+1.48-0woody3_sparc.deb
stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.dsc
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-s390/apache-perl_1.3.26-1-1.26-0woody2_s390.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-perl_1.3.26-1-1.26-0woody2_powerpc.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache-perl_1.3.26-1-1.26-0woody2_mipsel.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache-perl_1.3.26-1-1.26-0woody2_mips.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-perl_1.3.26-1-1.26-0woody2_m68k.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache-perl_1.3.26-1-1.26-0woody2_ia64.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-perl_1.3.26-1-1.26-0woody2_i386.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-perl_1.3.26-1-1.26-0woody2_hppa.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-perl_1.3.26-1-1.26-0woody2_arm.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache-perl_1.3.26-1-1.26-0woody2_alpha.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-sparc/apache-perl_1.3.26-1-1.26-0woody2_sparc.deb
stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.dsc
stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.tar.gz
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-s390/apache-dev_1.3.26-0woody3_s390.deb
stable/main/binary-s390/apache-common_1.3.26-0woody3_s390.deb
stable/main/binary-s390/apache_1.3.26-0woody3_s390.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-dev_1.3.26-0woody3_powerpc.deb
stable/main/binary-powerpc/apache_1.3.26-0woody3_powerpc.deb
stable/main/binary-powerpc/apache-common_1.3.26-0woody3_powerpc.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache_1.3.26-0woody3_mipsel.deb
stable/main/binary-mipsel/apache-common_1.3.26-0woody3_mipsel.deb
stable/main/binary-mipsel/apache-dev_1.3.26-0woody3_mipsel.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache_1.3.26-0woody3_mips.deb
stable/main/binary-mips/apache-dev_1.3.26-0woody3_mips.deb
stable/main/binary-mips/apache-common_1.3.26-0woody3_mips.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-dev_1.3.26-0woody3_m68k.deb
stable/main/binary-m68k/apache_1.3.26-0woody3_m68k.deb
stable/main/binary-m68k/apache-common_1.3.26-0woody3_m68k.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache_1.3.26-0woody3_ia64.deb
stable/main/binary-ia64/apache-dev_1.3.26-0woody3_ia64.deb
stable/main/binary-ia64/apache-common_1.3.26-0woody3_ia64.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-common_1.3.26-0woody3_i386.deb
stable/main/binary-i386/apache-dev_1.3.26-0woody3_i386.deb
stable/main/binary-i386/apache_1.3.26-0woody3_i386.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-common_1.3.26-0woody3_hppa.deb
stable/main/binary-hppa/apache_1.3.26-0woody3_hppa.deb
stable/main/binary-hppa/apache-dev_1.3.26-0woody3_hppa.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-common_1.3.26-0woody3_arm.deb
stable/main/binary-arm/apache_1.3.26-0woody3_arm.deb
stable/main/binary-arm/apache-dev_1.3.26-0woody3_arm.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache_1.3.26-0woody3_alpha.deb
stable/main/binary-alpha/apache-dev_1.3.26-0woody3_alpha.deb
stable/main/binary-alpha/apache-common_1.3.26-0woody3_alpha.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-sparc/apache-dev_1.3.26-0woody3_sparc.deb
stable/main/source/apache_1.3.26-0woody3.diff.gz
stable/main/binary-sparc/apache_1.3.26-0woody3_sparc.deb
stable/main/binary-sparc/apache-common_1.3.26-0woody3_sparc.deb
stable/main/source/apache_1.3.26-0woody3.dsc
stable/main/binary-all/apache-doc_1.3.26-0woody3_all.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/afterstep_1.8.11-5woody1_powerpc.deb
afterstep (1.8.11-5woody1) stable; urgency=low
  * Upload file overlapping fix from 1.8.11-5 to woody.


stable/main/binary-arm/afterstep_1.8.11-5woody1_arm.deb
afterstep (1.8.11-5woody1) testing; urgency=low
  * Upload file overlapping fix from 1.8.11-5 to woody.

=========================================
Sat,  20 Jul 2002 - Debian 3.0r0 released
=========================================