========================================= Thu, 20 Nov 2003 - Debian 3.0r2 released ========================================= Removed the following packages from stable: aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc aspell-doc | 0.33.7.1-8 | all aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The license incorrectly says that it's LGPL but it is in fact a unique license which is non-DFSG-free." -- cyrus-sasl2 | 2.1.2-2 | source libsasl2 | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-dev | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-digestmd5-plain | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-modules-plain | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc sasl2-bin | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The library has some minor security problems and according to the maintainer some other problems as well, i.e. it could not work with software in testing/unstable which requires it either. All of the SASL-using software in stable uses cyrus-sasl, not cyrus-sasl2." -- micq | 0.4.9-0woody2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The library has some minor security problems and according to Any version: Serious copyright violation, hence, removing. It's been removed from unstable and testing already. See Bug#167606 and Bug#194784" -- mindi | 0.58.r5-1 | alpha, arm, hppa, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "mindi is i386-centric since it uses lilo. It was only accidently set to arch=any" -- rocks-n-diamonds | 2.0.0-0.2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, s390, sparc rocks-n-diamonds | 2.0.0-0.2.1 | powerpc (Reason: as requested by Stable Release Manager) "Rocks-N-Diamonds contains sound, graphics and level data which violate section 2.3 of the Debian policy manual. Some of the game content originates with commercial sources that have not provided explicit permission for their reuse." -- python-tmda | 0.51-1 | all tmda | 0.51-1 | source, all (Reason: as requested by Stable Release Manager) "Bug#219361: please remove tmda from stable" -- zblast-svgalib | 1.2pre-5 | alpha (Reason: as requested by Stable Release Manager) "The alpha build failed completely because svgalib doesn't exist on alpha anymore in woody (i.e., its build-depends could not even be met), so I had to disable it. Hence, the alpha package needs to be removed." ------ stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.4_sparc.deb stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.4_sparc.deb stable/main/binary-sparc/openssl_0.9.6c-2.woody.4_sparc.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.4_s390.deb stable/main/binary-s390/openssl_0.9.6c-2.woody.4_s390.deb stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.4_s390.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.4_powerpc.deb stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.4_powerpc.deb stable/main/binary-powerpc/openssl_0.9.6c-2.woody.4_powerpc.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-mipsel/openssl_0.9.6c-2.woody.4_mipsel.deb stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.4_mipsel.deb stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.4_mipsel.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.4_mips.deb stable/main/binary-mips/openssl_0.9.6c-2.woody.4_mips.deb stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.4_mips.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.4_m68k.deb stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.4_m68k.deb stable/main/binary-m68k/openssl_0.9.6c-2.woody.4_m68k.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-ia64/openssl_0.9.6c-2.woody.4_ia64.deb stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.4_ia64.deb stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.4_ia64.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.4_hppa.deb stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.4_hppa.deb stable/main/binary-hppa/openssl_0.9.6c-2.woody.4_hppa.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.4_arm.deb stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.4_arm.deb stable/main/binary-arm/openssl_0.9.6c-2.woody.4_arm.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-alpha/openssl_0.9.6c-2.woody.4_alpha.deb stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.4_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.4_alpha.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/source/openssl_0.9.6c-2.woody.4.dsc stable/main/binary-i386/openssl_0.9.6c-2.woody.4_i386.deb stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.4_i386.deb stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.4_i386.deb stable/main/binary-all/ssleay_0.9.6c-2.woody.4_all.deb stable/main/source/openssl_0.9.6c-2.woody.4.diff.gz openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-sparc/nhfsstone_1.0-2woody1_sparc.deb stable/main/binary-sparc/nfs-kernel-server_1.0-2woody1_sparc.deb stable/main/binary-sparc/nfs-common_1.0-2woody1_sparc.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-s390/nhfsstone_1.0-2woody1_s390.deb stable/main/binary-s390/nfs-kernel-server_1.0-2woody1_s390.deb stable/main/binary-s390/nfs-common_1.0-2woody1_s390.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody1_powerpc.deb stable/main/binary-powerpc/nhfsstone_1.0-2woody1_powerpc.deb stable/main/binary-powerpc/nfs-common_1.0-2woody1_powerpc.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody1_mipsel.deb stable/main/binary-mipsel/nhfsstone_1.0-2woody1_mipsel.deb stable/main/binary-mipsel/nfs-common_1.0-2woody1_mipsel.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-mips/nfs-kernel-server_1.0-2woody1_mips.deb stable/main/binary-mips/nhfsstone_1.0-2woody1_mips.deb stable/main/binary-mips/nfs-common_1.0-2woody1_mips.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-m68k/nfs-kernel-server_1.0-2woody1_m68k.deb stable/main/binary-m68k/nfs-common_1.0-2woody1_m68k.deb stable/main/binary-m68k/nhfsstone_1.0-2woody1_m68k.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-ia64/nfs-kernel-server_1.0-2woody1_ia64.deb stable/main/binary-ia64/nhfsstone_1.0-2woody1_ia64.deb stable/main/binary-ia64/nfs-common_1.0-2woody1_ia64.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-hppa/nhfsstone_1.0-2woody1_hppa.deb stable/main/binary-hppa/nfs-kernel-server_1.0-2woody1_hppa.deb stable/main/binary-hppa/nfs-common_1.0-2woody1_hppa.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-arm/nfs-common_1.0-2woody1_arm.deb stable/main/binary-arm/nhfsstone_1.0-2woody1_arm.deb stable/main/binary-arm/nfs-kernel-server_1.0-2woody1_arm.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-alpha/nfs-common_1.0-2woody1_alpha.deb stable/main/binary-alpha/nfs-kernel-server_1.0-2woody1_alpha.deb stable/main/binary-alpha/nhfsstone_1.0-2woody1_alpha.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/source/nfs-utils_1.0-2woody1.tar.gz stable/main/binary-i386/nfs-common_1.0-2woody1_i386.deb stable/main/binary-i386/nhfsstone_1.0-2woody1_i386.deb stable/main/binary-i386/nfs-kernel-server_1.0-2woody1_i386.deb stable/main/source/nfs-utils_1.0-2woody1.dsc nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-sparc/zlib1g_1.1.4-1.0woody0_sparc.deb stable/main/binary-sparc/zlib-bin_1.1.4-1.0woody0_sparc.deb stable/main/binary-sparc/zlib1g-dev_1.1.4-1.0woody0_sparc.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-s390/zlib-bin_1.1.4-1.0woody0_s390.deb stable/main/binary-s390/zlib1g-dev_1.1.4-1.0woody0_s390.deb stable/main/binary-s390/zlib1g_1.1.4-1.0woody0_s390.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-powerpc/zlib1g_1.1.4-1.0woody0_powerpc.deb stable/main/binary-powerpc/zlib1g-dev_1.1.4-1.0woody0_powerpc.deb stable/main/binary-powerpc/zlib-bin_1.1.4-1.0woody0_powerpc.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-mipsel/zlib-bin_1.1.4-1.0woody0_mipsel.deb stable/main/binary-mipsel/zlib1g-dev_1.1.4-1.0woody0_mipsel.deb stable/main/binary-mipsel/zlib1g_1.1.4-1.0woody0_mipsel.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-mips/zlib1g-dev_1.1.4-1.0woody0_mips.deb stable/main/binary-mips/zlib-bin_1.1.4-1.0woody0_mips.deb stable/main/binary-mips/zlib1g_1.1.4-1.0woody0_mips.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-m68k/zlib1g-dev_1.1.4-1.0woody0_m68k.deb stable/main/binary-m68k/zlib1g_1.1.4-1.0woody0_m68k.deb stable/main/binary-m68k/zlib-bin_1.1.4-1.0woody0_m68k.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-ia64/zlib1g_1.1.4-1.0woody0_ia64.deb stable/main/binary-ia64/zlib1g-dev_1.1.4-1.0woody0_ia64.deb stable/main/binary-ia64/zlib-bin_1.1.4-1.0woody0_ia64.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-hppa/zlib-bin_1.1.4-1.0woody0_hppa.deb stable/main/binary-hppa/zlib1g-dev_1.1.4-1.0woody0_hppa.deb stable/main/binary-hppa/zlib1g_1.1.4-1.0woody0_hppa.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-arm/zlib-bin_1.1.4-1.0woody0_arm.deb stable/main/binary-arm/zlib1g-dev_1.1.4-1.0woody0_arm.deb stable/main/binary-arm/zlib1g_1.1.4-1.0woody0_arm.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-alpha/zlib1g-dev_1.1.4-1.0woody0_alpha.deb stable/main/binary-alpha/zlib1g_1.1.4-1.0woody0_alpha.deb stable/main/binary-alpha/zlib-bin_1.1.4-1.0woody0_alpha.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-i386/zlib-bin_1.1.4-1.0woody0_i386.deb stable/main/binary-i386/zlib1-altdev_1.1.4-1.0woody0_i386.deb stable/main/binary-i386/zlib1g_1.1.4-1.0woody0_i386.deb stable/main/source/zlib_1.1.4-1.0woody0.diff.gz stable/main/binary-i386/zlib1_1.1.4-1.0woody0_i386.deb stable/main/source/zlib_1.1.4-1.0woody0.dsc stable/main/binary-i386/zlib1g-dev_1.1.4-1.0woody0_i386.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-sparc/zblast-x11_1.2pre-5woody2_sparc.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-s390/zblast-x11_1.2pre-5woody2_s390.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-powerpc/zblast-x11_1.2pre-5woody2_powerpc.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-mipsel/zblast-x11_1.2pre-5woody2_mipsel.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-mips/zblast-x11_1.2pre-5woody2_mips.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-m68k/zblast-x11_1.2pre-5woody2_m68k.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-ia64/zblast-x11_1.2pre-5woody2_ia64.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-hppa/zblast-x11_1.2pre-5woody2_hppa.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-arm/zblast-x11_1.2pre-5woody2_arm.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-alpha/zblast-x11_1.2pre-5woody2_alpha.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-i386/zblast-svgalib_1.2pre-5woody2_i386.deb stable/main/binary-all/zblast-data_1.2pre-5woody2_all.deb stable/main/source/zblast_1.2pre-5woody2.diff.gz stable/main/source/zblast_1.2pre-5woody2.dsc stable/main/binary-i386/zblast-x11_1.2pre-5woody2_i386.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-sparc/xtokkaetama_1.0b-6woody2_sparc.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-s390/xtokkaetama_1.0b-6woody2_s390.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-powerpc/xtokkaetama_1.0b-6woody2_powerpc.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-mipsel/xtokkaetama_1.0b-6woody2_mipsel.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-mips/xtokkaetama_1.0b-6woody2_mips.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-m68k/xtokkaetama_1.0b-6woody2_m68k.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-ia64/xtokkaetama_1.0b-6woody2_ia64.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-hppa/xtokkaetama_1.0b-6woody2_hppa.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-arm/xtokkaetama_1.0b-6woody2_arm.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-alpha/xtokkaetama_1.0b-6woody2_alpha.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/source/xtokkaetama_1.0b-6woody2.dsc stable/main/source/xtokkaetama_1.0b-6woody2.diff.gz stable/main/binary-i386/xtokkaetama_1.0b-6woody2_i386.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-s390/xpdf-reader_1.00-3.1_s390.deb stable/main/binary-s390/xpdf-utils_1.00-3.1_s390.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-powerpc/xpdf-utils_1.00-3.1_powerpc.deb stable/main/binary-powerpc/xpdf-reader_1.00-3.1_powerpc.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-mipsel/xpdf-utils_1.00-3.1_mipsel.deb stable/main/binary-mipsel/xpdf-reader_1.00-3.1_mipsel.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-mips/xpdf-reader_1.00-3.1_mips.deb stable/main/binary-mips/xpdf-utils_1.00-3.1_mips.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-m68k/xpdf-utils_1.00-3.1_m68k.deb stable/main/binary-m68k/xpdf-reader_1.00-3.1_m68k.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-ia64/xpdf-utils_1.00-3.1_ia64.deb stable/main/binary-ia64/xpdf-reader_1.00-3.1_ia64.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-i386/xpdf-utils_1.00-3.1_i386.deb stable/main/binary-i386/xpdf-reader_1.00-3.1_i386.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-hppa/xpdf-reader_1.00-3.1_hppa.deb stable/main/binary-hppa/xpdf-utils_1.00-3.1_hppa.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-arm/xpdf-reader_1.00-3.1_arm.deb stable/main/binary-arm/xpdf-utils_1.00-3.1_arm.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-alpha/xpdf-reader_1.00-3.1_alpha.deb stable/main/binary-alpha/xpdf-utils_1.00-3.1_alpha.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-sparc/xpdf-utils_1.00-3.1_sparc.deb stable/main/binary-sparc/xpdf-reader_1.00-3.1_sparc.deb stable/main/source/xpdf_1.00-3.1.diff.gz stable/main/binary-all/xpdf-common_1.00-3.1_all.deb stable/main/source/xpdf_1.00-3.1.dsc stable/main/binary-all/xpdf_1.00-3.1_all.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-sparc/xnc_4.4.7-3.woody.1_sparc.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-s390/xnc_4.4.7-3.woody.1_s390.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-powerpc/xnc_4.4.7-3.woody.1_powerpc.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-mipsel/xnc_4.4.7-3.woody.1_mipsel.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-mips/xnc_4.4.7-3.woody.1_mips.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-m68k/xnc_4.4.7-3.woody.1_m68k.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-ia64/xnc_4.4.7-3.woody.1_ia64.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-hppa/xnc_4.4.7-3.woody.1_hppa.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-arm/xnc_4.4.7-3.woody.1_arm.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-alpha/xnc_4.4.7-3.woody.1_alpha.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/source/xnc_4.4.7-3.woody.1.diff.gz stable/main/binary-i386/xnc_4.4.7-3.woody.1_i386.deb stable/main/source/xnc_4.4.7-3.woody.1.dsc xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-sparc/xgalaga_2.0.34-19woody1_sparc.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-s390/xgalaga_2.0.34-19woody1_s390.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-powerpc/xgalaga_2.0.34-19woody1_powerpc.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-mipsel/xgalaga_2.0.34-19woody1_mipsel.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-mips/xgalaga_2.0.34-19woody1_mips.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-m68k/xgalaga_2.0.34-19woody1_m68k.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-ia64/xgalaga_2.0.34-19woody1_ia64.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-hppa/xgalaga_2.0.34-19woody1_hppa.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-arm/xgalaga_2.0.34-19woody1_arm.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-alpha/xgalaga_2.0.34-19woody1_alpha.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/source/xgalaga_2.0.34-19woody1.diff.gz stable/main/binary-i386/xgalaga_2.0.34-19woody1_i386.deb stable/main/source/xgalaga_2.0.34-19woody1.dsc xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-sparc/xfstt_1.2.1-3_sparc.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-s390/xfstt_1.2.1-3_s390.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-powerpc/xfstt_1.2.1-3_powerpc.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-mipsel/xfstt_1.2.1-3_mipsel.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-mips/xfstt_1.2.1-3_mips.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-m68k/xfstt_1.2.1-3_m68k.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-ia64/xfstt_1.2.1-3_ia64.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-hppa/xfstt_1.2.1-3_hppa.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-arm/xfstt_1.2.1-3_arm.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-alpha/xfstt_1.2.1-3_alpha.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/source/xfstt_1.2.1-3.tar.gz stable/main/source/xfstt_1.2.1-3.dsc stable/main/binary-i386/xfstt_1.2.1-3_i386.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-s390/xfsdump_2.0.1-2_s390.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-powerpc/xfsdump_2.0.1-2_powerpc.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-mipsel/xfsdump_2.0.1-2_mipsel.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-mips/xfsdump_2.0.1-2_mips.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-m68k/xfsdump_2.0.1-2_m68k.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-ia64/xfsdump_2.0.1-2_ia64.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-i386/xfsdump_2.0.1-2_i386.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-hppa/xfsdump_2.0.1-2_hppa.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-arm/xfsdump_2.0.1-2_arm.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-alpha/xfsdump_2.0.1-2_alpha.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/source/xfsdump_2.0.1-2.dsc stable/main/source/xfsdump_2.0.1-2.tar.gz stable/main/binary-sparc/xfsdump_2.0.1-2_sparc.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-sparc/xterm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xutils_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xprt_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/proxymngr_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps1_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa3_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xnest_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/lbxproxy_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xdm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xbase-clients_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-pic_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/x-window-system-core_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xfs_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xmh_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xfwp_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xserver-common_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xvfb_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/twm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs_4.1.0-16woody1_sparc.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-s390/xterm_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa3_4.1.0-16woody1_s390.deb stable/main/binary-s390/xvfb_4.1.0-16woody1_s390.deb stable/main/binary-s390/xbase-clients_4.1.0-16woody1_s390.deb stable/main/binary-s390/proxymngr_4.1.0-16woody1_s390.deb stable/main/binary-s390/lbxproxy_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps1_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xdm_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6_4.1.0-16woody1_s390.deb stable/main/binary-s390/xfwp_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs_4.1.0-16woody1_s390.deb stable/main/binary-s390/xmh_4.1.0-16woody1_s390.deb stable/main/binary-s390/x-window-system-core_4.1.0-16woody1_s390.deb stable/main/binary-s390/xnest_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xprt_4.1.0-16woody1_s390.deb stable/main/binary-s390/xutils_4.1.0-16woody1_s390.deb stable/main/binary-s390/xserver-common_4.1.0-16woody1_s390.deb stable/main/binary-s390/twm_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-pic_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps1-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xfs_4.1.0-16woody1_s390.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xserver-common_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps1_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xterm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xdm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/proxymngr_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xvfb_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/twm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xfs_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xutils_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xbase-clients_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xprt_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xfwp_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xnest_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xmh_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody1_mipsel.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-mips/libxaw6-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xutils_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa3_4.1.0-16woody1_mips.deb stable/main/binary-mips/xserver-xfree86_4.1.0-16woody1_mips.deb stable/main/binary-mips/x-window-system-core_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs_4.1.0-16woody1_mips.deb stable/main/binary-mips/xvfb_4.1.0-16woody1_mips.deb stable/main/binary-mips/twm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps1_4.1.0-16woody1_mips.deb stable/main/binary-mips/xterm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xdm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xmh_4.1.0-16woody1_mips.deb stable/main/binary-mips/xserver-common_4.1.0-16woody1_mips.deb stable/main/binary-mips/xbase-clients_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw6_4.1.0-16woody1_mips.deb stable/main/binary-mips/xnest_4.1.0-16woody1_mips.deb stable/main/binary-mips/xfs_4.1.0-16woody1_mips.deb stable/main/binary-mips/xfwp_4.1.0-16woody1_mips.deb stable/main/binary-mips/proxymngr_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-pic_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps1-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xprt_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/lbxproxy_4.1.0-16woody1_mips.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xdm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xbase-clients_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps1_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/x-window-system-core_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xterm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/proxymngr_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa3_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xfs_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/lbxproxy_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xvfb_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xmh_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xfwp_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw6_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-pic_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xserver-common_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xprt_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xutils_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/twm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xnest_4.1.0-16woody1_m68k.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa3_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps1_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/x-window-system-core_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xvfb_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xprt_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/lbxproxy_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xdm_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xbase-clients_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw6_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xfwp_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xmh_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xserver-common_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xterm_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xfs_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xnest_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xutils_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-pic_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/proxymngr_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/twm_4.1.0-16woody1_ia64.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-i386/lbxproxy_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa3_4.1.0-16woody1_i386.deb stable/main/binary-i386/xutils_4.1.0-16woody1_i386.deb stable/main/binary-i386/proxymngr_4.1.0-16woody1_i386.deb stable/main/binary-i386/xnest_4.1.0-16woody1_i386.deb stable/main/binary-i386/xbase-clients_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps1_4.1.0-16woody1_i386.deb stable/main/binary-i386/x-window-system-core_4.1.0-16woody1_i386.deb stable/main/binary-i386/xvfb_4.1.0-16woody1_i386.deb stable/main/binary-i386/xterm_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xprt_4.1.0-16woody1_i386.deb stable/main/binary-i386/xmh_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs_4.1.0-16woody1_i386.deb stable/main/binary-i386/xfwp_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xfs_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xserver-common_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps1-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xserver-xfree86_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-pic_4.1.0-16woody1_i386.deb stable/main/binary-i386/twm_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xdm_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa3_4.1.0-16woody1_i386.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-hppa/libxaw6_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xfwp_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xmh_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/twm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xdm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xprt_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xutils_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xserver-common_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xfs_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xnest_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xterm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xvfb_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa3_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps1_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/lbxproxy_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/x-window-system-core_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xbase-clients_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/proxymngr_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-pic_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody1_hppa.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-arm/xlibs-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/proxymngr_4.1.0-16woody1_arm.deb stable/main/binary-arm/xnest_4.1.0-16woody1_arm.deb stable/main/binary-arm/xbase-clients_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xserver-xfree86_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs-pic_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa3_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps1-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/xserver-common_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xdm_4.1.0-16woody1_arm.deb stable/main/binary-arm/x-window-system-core_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/lbxproxy_4.1.0-16woody1_arm.deb stable/main/binary-arm/twm_4.1.0-16woody1_arm.deb stable/main/binary-arm/xmh_4.1.0-16woody1_arm.deb stable/main/binary-arm/xprt_4.1.0-16woody1_arm.deb stable/main/binary-arm/xvfb_4.1.0-16woody1_arm.deb stable/main/binary-arm/xterm_4.1.0-16woody1_arm.deb stable/main/binary-arm/xfs_4.1.0-16woody1_arm.deb stable/main/binary-arm/xutils_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps1_4.1.0-16woody1_arm.deb stable/main/binary-arm/xfwp_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6_4.1.0-16woody1_arm.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xvfb_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa3_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xserver-common_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xutils_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps1_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/twm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/proxymngr_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xmh_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-pic_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xterm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xnest_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xprt_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xdm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/x-window-system-core_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xbase-clients_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/lbxproxy_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xfwp_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xfs_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody1_alpha.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-all/xfonts-scalable_4.1.0-16woody1_all.deb stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody1_all.deb stable/main/source/xfree86_4.1.0-16woody1.diff.gz stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xmh_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xfs_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xvfb_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/twm_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libdps1_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-pex_4.1.0-16woody1_all.deb stable/main/binary-all/xfree86-common_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xbase-clients_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-75dpi_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xprt_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xlib6g-dev_4.1.0-16woody1_all.deb stable/main/binary-powerpc/libdps-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xfwp_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-base_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xnest_4.1.0-16woody1_powerpc.deb stable/main/binary-all/x-window-system_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xutils_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xserver-common_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xdm_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xlib6g_4.1.0-16woody1_all.deb stable/main/binary-powerpc/proxymngr_4.1.0-16woody1_powerpc.deb stable/main/source/xfree86_4.1.0-16woody1.dsc stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-100dpi_4.1.0-16woody1_all.deb stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xterm_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xspecs_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw6_4.1.0-16woody1_powerpc.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-sparc/xbl_1.0k-3woody2_sparc.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-s390/xbl_1.0k-3woody2_s390.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-powerpc/xbl_1.0k-3woody2_powerpc.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-mipsel/xbl_1.0k-3woody2_mipsel.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-mips/xbl_1.0k-3woody2_mips.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-m68k/xbl_1.0k-3woody2_m68k.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-ia64/xbl_1.0k-3woody2_ia64.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-hppa/xbl_1.0k-3woody2_hppa.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-arm/xbl_1.0k-3woody2_arm.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-alpha/xbl_1.0k-3woody2_alpha.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/source/xbl_1.0k-3woody2.dsc stable/main/source/xbl_1.0k-3woody2.diff.gz stable/main/binary-i386/xbl_1.0k-3woody2_i386.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/source/x-face-el_1.3.6.19-1woody1.dsc stable/main/source/x-face-el_1.3.6.19-1woody1.diff.gz stable/main/binary-all/x-face-el_1.3.6.19-1woody1_all.deb x-face-el (1.3.6.19-1woody1) stable-security; urgency=high * Fix insecure tempfile handling. (backport from 1.3.6.23) stable/main/binary-sparc/wu-ftpd_2.6.2-3woody2_sparc.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-s390/wu-ftpd_2.6.2-3woody2_s390.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody2_powerpc.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody2_mipsel.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-mips/wu-ftpd_2.6.2-3woody2_mips.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-m68k/wu-ftpd_2.6.2-3woody2_m68k.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-ia64/wu-ftpd_2.6.2-3woody2_ia64.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-hppa/wu-ftpd_2.6.2-3woody2_hppa.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-arm/wu-ftpd_2.6.2-3woody2_arm.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-alpha/wu-ftpd_2.6.2-3woody2_alpha.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/source/wu-ftpd_2.6.2-3woody2.diff.gz stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody2_all.deb stable/main/source/wu-ftpd_2.6.2-3woody2.dsc stable/main/binary-i386/wu-ftpd_2.6.2-3woody2_i386.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.diff.gz stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.dsc stable/main/binary-all/wemi_1.14.0.20010802wemiko-1.3woody1_all.deb wemi (1.14.0.20010802wemiko-1.3woody1) stable; urgency=high * Non-maintainer upload by the Stable Release Manager * Only bump up the version number so it'll be accepted by katie stable/main/binary-sparc/webfs_1.17.2_sparc.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-s390/webfs_1.17.2_s390.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-powerpc/webfs_1.17.2_powerpc.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-mipsel/webfs_1.17.2_mipsel.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-mips/webfs_1.17.2_mips.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-m68k/webfs_1.17.2_m68k.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-ia64/webfs_1.17.2_ia64.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-hppa/webfs_1.17.2_hppa.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-arm/webfs_1.17.2_arm.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-alpha/webfs_1.17.2_alpha.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/source/webfs_1.17.2.dsc stable/main/source/webfs_1.17.2.tar.gz stable/main/binary-i386/webfs_1.17.2_i386.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-sparc/w3mmee-ssl_0.3.p23.3-1.5_sparc.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3mmee-ssl_0.3.p23.3-1.5_s390.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3mmee-ssl_0.3.p23.3-1.5_mipsel.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3mmee-ssl_0.3.p23.3-1.5_mips.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3mmee-ssl_0.3.p23.3-1.5_m68k.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-ia64/w3mmee-ssl_0.3.p23.3-1.5_ia64.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3mmee-ssl_0.3.p23.3-1.5_i386.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3mmee-ssl_0.3.p23.3-1.5_hppa.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3mmee-ssl_0.3.p23.3-1.5_arm.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3mmee-ssl_0.3.p23.3-1.5_alpha.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3mmee-ssl_0.3.p23.3-1.5_powerpc.deb stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.dsc stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.diff.gz w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3mmee_0.3.p23.3-1.5_s390.deb stable/main/binary-s390/w3mmee-img_0.3.p23.3-1.5_s390.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3mmee_0.3.p23.3-1.5_powerpc.deb stable/main/binary-powerpc/w3mmee-img_0.3.p23.3-1.5_powerpc.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3mmee_0.3.p23.3-1.5_mipsel.deb stable/main/binary-mipsel/w3mmee-img_0.3.p23.3-1.5_mipsel.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3mmee_0.3.p23.3-1.5_mips.deb stable/main/binary-mips/w3mmee-img_0.3.p23.3-1.5_mips.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3mmee-img_0.3.p23.3-1.5_m68k.deb stable/main/binary-m68k/w3mmee_0.3.p23.3-1.5_m68k.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-ia64/w3mmee_0.3.p23.3-1.5_ia64.deb stable/main/binary-ia64/w3mmee-img_0.3.p23.3-1.5_ia64.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3mmee-img_0.3.p23.3-1.5_i386.deb stable/main/binary-i386/w3mmee_0.3.p23.3-1.5_i386.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3mmee_0.3.p23.3-1.5_hppa.deb stable/main/binary-hppa/w3mmee-img_0.3.p23.3-1.5_hppa.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3mmee-img_0.3.p23.3-1.5_arm.deb stable/main/binary-arm/w3mmee_0.3.p23.3-1.5_arm.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3mmee-img_0.3.p23.3-1.5_alpha.deb stable/main/binary-alpha/w3mmee_0.3.p23.3-1.5_alpha.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/w3mmee-img_0.3.p23.3-1.5_sparc.deb stable/main/binary-sparc/w3mmee_0.3.p23.3-1.5_sparc.deb stable/main/source/w3mmee_0.3.p23.3-1.5.dsc stable/main/source/w3mmee_0.3.p23.3-1.5.diff.gz w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3m-ssl_0.3-2.4_s390.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3m-ssl_0.3-2.4_powerpc.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3m-ssl_0.3-2.4_mipsel.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3m-ssl_0.3-2.4_mips.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3m-ssl_0.3-2.4_m68k.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3m-ssl_0.3-2.4_i386.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3m-ssl_0.3-2.4_hppa.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3m-ssl_0.3-2.4_arm.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3m-ssl_0.3-2.4_alpha.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/w3m-ssl_0.3-2.4_sparc.deb stable/main/source/w3m-ssl_0.3-2.4.diff.gz stable/main/source/w3m-ssl_0.3-2.4.dsc w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3m-img_0.3-2.4_s390.deb stable/main/binary-s390/w3m_0.3-2.4_s390.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3m-img_0.3-2.4_powerpc.deb stable/main/binary-powerpc/w3m_0.3-2.4_powerpc.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3m-img_0.3-2.4_mipsel.deb stable/main/binary-mipsel/w3m_0.3-2.4_mipsel.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3m-img_0.3-2.4_mips.deb stable/main/binary-mips/w3m_0.3-2.4_mips.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3m_0.3-2.4_m68k.deb stable/main/binary-m68k/w3m-img_0.3-2.4_m68k.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3m_0.3-2.4_i386.deb stable/main/binary-i386/w3m-img_0.3-2.4_i386.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3m-img_0.3-2.4_hppa.deb stable/main/binary-hppa/w3m_0.3-2.4_hppa.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3m_0.3-2.4_arm.deb stable/main/binary-arm/w3m-img_0.3-2.4_arm.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3m_0.3-2.4_alpha.deb stable/main/binary-alpha/w3m-img_0.3-2.4_alpha.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/source/w3m_0.3-2.4.dsc stable/main/binary-sparc/w3m_0.3-2.4_sparc.deb stable/main/source/w3m_0.3-2.4.diff.gz stable/main/binary-sparc/w3m-img_0.3-2.4_sparc.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/util-linux_2.11n-7_sparc.deb stable/main/binary-sparc/mount_2.11n-7_sparc.deb stable/main/binary-sparc/bsdutils_2.11n-7_sparc.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-s390/mount_2.11n-7_s390.deb stable/main/binary-s390/util-linux_2.11n-7_s390.deb stable/main/binary-s390/bsdutils_2.11n-7_s390.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-powerpc/bsdutils_2.11n-7_powerpc.deb stable/main/binary-powerpc/util-linux_2.11n-7_powerpc.deb stable/main/binary-powerpc/mount_2.11n-7_powerpc.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-mipsel/mount_2.11n-7_mipsel.deb stable/main/binary-mipsel/util-linux_2.11n-7_mipsel.deb stable/main/binary-mipsel/bsdutils_2.11n-7_mipsel.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-mips/util-linux_2.11n-7_mips.deb stable/main/binary-mips/bsdutils_2.11n-7_mips.deb stable/main/binary-mips/mount_2.11n-7_mips.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-m68k/mount_2.11n-7_m68k.deb stable/main/binary-m68k/util-linux_2.11n-7_m68k.deb stable/main/binary-m68k/bsdutils_2.11n-7_m68k.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-ia64/bsdutils_2.11n-7_ia64.deb stable/main/binary-ia64/util-linux_2.11n-7_ia64.deb stable/main/binary-ia64/mount_2.11n-7_ia64.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-hppa/bsdutils_2.11n-7_hppa.deb stable/main/binary-hppa/util-linux_2.11n-7_hppa.deb stable/main/binary-hppa/mount_2.11n-7_hppa.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-arm/mount_2.11n-7_arm.deb stable/main/binary-arm/bsdutils_2.11n-7_arm.deb stable/main/binary-arm/util-linux_2.11n-7_arm.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-alpha/mount_2.11n-7_alpha.deb stable/main/binary-alpha/util-linux_2.11n-7_alpha.deb stable/main/binary-alpha/bsdutils_2.11n-7_alpha.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-all/util-linux-locales_2.11n-7_all.deb stable/main/source/util-linux_2.11n-7.dsc stable/main/binary-i386/util-linux_2.11n-7_i386.deb stable/main/binary-i386/bsdutils_2.11n-7_i386.deb stable/main/source/util-linux_2.11n-7.diff.gz stable/main/binary-i386/mount_2.11n-7_i386.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-sparc/unzip_5.50-1woody2_sparc.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-s390/unzip_5.50-1woody2_s390.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-powerpc/unzip_5.50-1woody2_powerpc.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-mipsel/unzip_5.50-1woody2_mipsel.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-mips/unzip_5.50-1woody2_mips.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-m68k/unzip_5.50-1woody2_m68k.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-ia64/unzip_5.50-1woody2_ia64.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-hppa/unzip_5.50-1woody2_hppa.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-arm/unzip_5.50-1woody2_arm.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-alpha/unzip_5.50-1woody2_alpha.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/source/unzip_5.50-1woody2.dsc stable/main/source/unzip_5.50-1woody2.diff.gz stable/main/binary-i386/unzip_5.50-1woody2_i386.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-sparc/typespeed_0.4.1-2.2_sparc.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-s390/typespeed_0.4.1-2.2_s390.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-powerpc/typespeed_0.4.1-2.2_powerpc.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-mipsel/typespeed_0.4.1-2.2_mipsel.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-mips/typespeed_0.4.1-2.2_mips.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-m68k/typespeed_0.4.1-2.2_m68k.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-ia64/typespeed_0.4.1-2.2_ia64.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-hppa/typespeed_0.4.1-2.2_hppa.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-arm/typespeed_0.4.1-2.2_arm.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-alpha/typespeed_0.4.1-2.2_alpha.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/source/typespeed_0.4.1-2.2.dsc stable/main/source/typespeed_0.4.1-2.2.diff.gz stable/main/binary-i386/typespeed_0.4.1-2.2_i386.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-sparc/traceroute-nanog_6.1.1-1.3_sparc.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-s390/traceroute-nanog_6.1.1-1.3_s390.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-powerpc/traceroute-nanog_6.1.1-1.3_powerpc.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-mipsel/traceroute-nanog_6.1.1-1.3_mipsel.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-mips/traceroute-nanog_6.1.1-1.3_mips.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-m68k/traceroute-nanog_6.1.1-1.3_m68k.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-ia64/traceroute-nanog_6.1.1-1.3_ia64.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-hppa/traceroute-nanog_6.1.1-1.3_hppa.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-arm/traceroute-nanog_6.1.1-1.3_arm.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-alpha/traceroute-nanog_6.1.1-1.3_alpha.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/source/traceroute-nanog_6.1.1-1.3.diff.gz stable/main/binary-i386/traceroute-nanog_6.1.1-1.3_i386.deb stable/main/source/traceroute-nanog_6.1.1-1.3.dsc traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/contrib/source/tomcat4_4.0.3-3woody3.dsc stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody3_all.deb stable/contrib/binary-all/tomcat4_4.0.3-3woody3_all.deb stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody3_all.deb stable/contrib/source/tomcat4_4.0.3-3woody3.diff.gz tomcat4 (4.0.3-3woody3) stable-security; urgency=high * Include a patch from Aldrin Martoq which fixes a DoS attack (closes: #215506) * Correctly start tomcat4 when booting (closes: #198226) stable/contrib/source/tomcat_3.3a-4woody1.diff.gz stable/contrib/binary-i386/libapache-mod-jk_3.3a-4woody1_i386.deb stable/contrib/source/tomcat_3.3a-4woody1.dsc stable/contrib/binary-all/tomcat_3.3a-4woody1_all.deb tomcat (3.3a-4woody1) unstable; urgency=high * Include two security fixes from the Tomcat 3.3.1a release: + when used with JDK 1.3.1 or earlier, a maliciously crafted request could return a directory listing even when an index.html, index.jsp, or other welcome file is present. File contents can be returned as well. + a malicious web application could read the contents of some files outside the web application via its web.xml file in spite of the presence of a security manager * Disable the examples webapp since it contains cross site scripting vulnerability: examples.war is now installed in /usr/share/doc/tomcat/examples stable/main/binary-s390/thttpd-util_2.21b-11.2_s390.deb stable/main/binary-s390/thttpd_2.21b-11.2_s390.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-powerpc/thttpd-util_2.21b-11.2_powerpc.deb stable/main/binary-powerpc/thttpd_2.21b-11.2_powerpc.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-mipsel/thttpd_2.21b-11.2_mipsel.deb stable/main/binary-mipsel/thttpd-util_2.21b-11.2_mipsel.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-mips/thttpd-util_2.21b-11.2_mips.deb stable/main/binary-mips/thttpd_2.21b-11.2_mips.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-m68k/thttpd_2.21b-11.2_m68k.deb stable/main/binary-m68k/thttpd-util_2.21b-11.2_m68k.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-ia64/thttpd-util_2.21b-11.2_ia64.deb stable/main/binary-ia64/thttpd_2.21b-11.2_ia64.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-i386/thttpd_2.21b-11.2_i386.deb stable/main/binary-i386/thttpd-util_2.21b-11.2_i386.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-hppa/thttpd-util_2.21b-11.2_hppa.deb stable/main/binary-hppa/thttpd_2.21b-11.2_hppa.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-arm/thttpd-util_2.21b-11.2_arm.deb stable/main/binary-arm/thttpd_2.21b-11.2_arm.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-alpha/thttpd-util_2.21b-11.2_alpha.deb stable/main/binary-alpha/thttpd_2.21b-11.2_alpha.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-sparc/thttpd_2.21b-11.2_sparc.deb stable/main/source/thttpd_2.21b-11.2.diff.gz stable/main/source/thttpd_2.21b-11.2.dsc stable/main/binary-sparc/thttpd-util_2.21b-11.2_sparc.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-sparc/teapop_0.3.4-1woody2_sparc.deb stable/main/binary-sparc/teapop-mysql_0.3.4-1woody2_sparc.deb stable/main/binary-sparc/teapop-pgsql_0.3.4-1woody2_sparc.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-s390/teapop-pgsql_0.3.4-1woody2_s390.deb stable/main/binary-s390/teapop_0.3.4-1woody2_s390.deb stable/main/binary-s390/teapop-mysql_0.3.4-1woody2_s390.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-powerpc/teapop-pgsql_0.3.4-1woody2_powerpc.deb stable/main/binary-powerpc/teapop-mysql_0.3.4-1woody2_powerpc.deb stable/main/binary-powerpc/teapop_0.3.4-1woody2_powerpc.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-mipsel/teapop-pgsql_0.3.4-1woody2_mipsel.deb stable/main/binary-mipsel/teapop-mysql_0.3.4-1woody2_mipsel.deb stable/main/binary-mipsel/teapop_0.3.4-1woody2_mipsel.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-mips/teapop-mysql_0.3.4-1woody2_mips.deb stable/main/binary-mips/teapop_0.3.4-1woody2_mips.deb stable/main/binary-mips/teapop-pgsql_0.3.4-1woody2_mips.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-m68k/teapop-mysql_0.3.4-1woody2_m68k.deb stable/main/binary-m68k/teapop_0.3.4-1woody2_m68k.deb stable/main/binary-m68k/teapop-pgsql_0.3.4-1woody2_m68k.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-ia64/teapop-mysql_0.3.4-1woody2_ia64.deb stable/main/binary-ia64/teapop-pgsql_0.3.4-1woody2_ia64.deb stable/main/binary-ia64/teapop_0.3.4-1woody2_ia64.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-hppa/teapop_0.3.4-1woody2_hppa.deb stable/main/binary-hppa/teapop-pgsql_0.3.4-1woody2_hppa.deb stable/main/binary-hppa/teapop-mysql_0.3.4-1woody2_hppa.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-arm/teapop_0.3.4-1woody2_arm.deb stable/main/binary-arm/teapop-mysql_0.3.4-1woody2_arm.deb stable/main/binary-arm/teapop-pgsql_0.3.4-1woody2_arm.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-alpha/teapop-mysql_0.3.4-1woody2_alpha.deb stable/main/binary-alpha/teapop-pgsql_0.3.4-1woody2_alpha.deb stable/main/binary-alpha/teapop_0.3.4-1woody2_alpha.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/source/teapop_0.3.4-1woody2.dsc stable/main/binary-i386/teapop_0.3.4-1woody2_i386.deb stable/main/source/teapop_0.3.4-1woody2.diff.gz stable/main/binary-i386/teapop-mysql_0.3.4-1woody2_i386.deb stable/main/binary-i386/teapop-pgsql_0.3.4-1woody2_i386.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-sparc/tcptraceroute_1.2-2_sparc.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-s390/tcptraceroute_1.2-2_s390.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-powerpc/tcptraceroute_1.2-2_powerpc.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-mipsel/tcptraceroute_1.2-2_mipsel.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-mips/tcptraceroute_1.2-2_mips.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-m68k/tcptraceroute_1.2-2_m68k.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-ia64/tcptraceroute_1.2-2_ia64.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-hppa/tcptraceroute_1.2-2_hppa.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-arm/tcptraceroute_1.2-2_arm.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-alpha/tcptraceroute_1.2-2_alpha.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/source/tcptraceroute_1.2-2.diff.gz stable/main/binary-i386/tcptraceroute_1.2-2_i386.deb stable/main/source/tcptraceroute_1.2-2.dsc tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-s390/tcpdump_3.6.2-2.4_s390.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-powerpc/tcpdump_3.6.2-2.4_powerpc.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-mipsel/tcpdump_3.6.2-2.4_mipsel.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-mips/tcpdump_3.6.2-2.4_mips.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-m68k/tcpdump_3.6.2-2.4_m68k.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-ia64/tcpdump_3.6.2-2.4_ia64.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-i386/tcpdump_3.6.2-2.4_i386.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-hppa/tcpdump_3.6.2-2.4_hppa.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-arm/tcpdump_3.6.2-2.4_arm.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-alpha/tcpdump_3.6.2-2.4_alpha.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/source/tcpdump_3.6.2-2.4.diff.gz stable/main/binary-sparc/tcpdump_3.6.2-2.4_sparc.deb stable/main/source/tcpdump_3.6.2-2.4.dsc tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-sparc/sup_1.8-8woody1_sparc.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-s390/sup_1.8-8woody1_s390.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-powerpc/sup_1.8-8woody1_powerpc.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-mipsel/sup_1.8-8woody1_mipsel.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-mips/sup_1.8-8woody1_mips.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-m68k/sup_1.8-8woody1_m68k.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-ia64/sup_1.8-8woody1_ia64.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-hppa/sup_1.8-8woody1_hppa.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-arm/sup_1.8-8woody1_arm.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-alpha/sup_1.8-8woody1_alpha.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-i386/sup_1.8-8woody1_i386.deb stable/main/source/sup_1.8-8woody1.diff.gz stable/main/source/sup_1.8-8woody1.dsc sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/source/squirrelmail_1.2.6-1.3.dsc stable/main/binary-all/squirrelmail_1.2.6-1.3_all.deb stable/main/source/squirrelmail_1.2.6-1.3.diff.gz squirrelmail (1:1.2.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed cross site scripting problem in read_body.php (BugTraq ID 6302, CAN-2002-1341) stable/main/binary-sparc/spamassassin_2.20-1woody3_sparc.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-s390/spamassassin_2.20-1woody3_s390.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-powerpc/spamassassin_2.20-1woody3_powerpc.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-mipsel/spamassassin_2.20-1woody3_mipsel.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-mips/spamassassin_2.20-1woody3_mips.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-m68k/spamassassin_2.20-1woody3_m68k.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-ia64/spamassassin_2.20-1woody3_ia64.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-hppa/spamassassin_2.20-1woody3_hppa.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-arm/spamassassin_2.20-1woody3_arm.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-alpha/spamassassin_2.20-1woody3_alpha.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-i386/spamassassin_2.20-1woody3_i386.deb stable/main/source/spamassassin_2.20-1woody3.diff.gz stable/main/source/spamassassin_2.20-1woody3.dsc spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-sparc/snort-common_1.8.4beta1-3.1_sparc.deb stable/main/binary-sparc/snort_1.8.4beta1-3.1_sparc.deb stable/main/binary-sparc/snort-mysql_1.8.4beta1-3.1_sparc.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-s390/snort-common_1.8.4beta1-3.1_s390.deb stable/main/binary-s390/snort-mysql_1.8.4beta1-3.1_s390.deb stable/main/binary-s390/snort_1.8.4beta1-3.1_s390.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-powerpc/snort-common_1.8.4beta1-3.1_powerpc.deb stable/main/binary-powerpc/snort_1.8.4beta1-3.1_powerpc.deb stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3.1_powerpc.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3.1_mipsel.deb stable/main/binary-mipsel/snort_1.8.4beta1-3.1_mipsel.deb stable/main/binary-mipsel/snort-common_1.8.4beta1-3.1_mipsel.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-mips/snort-common_1.8.4beta1-3.1_mips.deb stable/main/binary-mips/snort-mysql_1.8.4beta1-3.1_mips.deb stable/main/binary-mips/snort_1.8.4beta1-3.1_mips.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-m68k/snort_1.8.4beta1-3.1_m68k.deb stable/main/binary-m68k/snort-mysql_1.8.4beta1-3.1_m68k.deb stable/main/binary-m68k/snort-common_1.8.4beta1-3.1_m68k.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-ia64/snort-mysql_1.8.4beta1-3.1_ia64.deb stable/main/binary-ia64/snort-common_1.8.4beta1-3.1_ia64.deb stable/main/binary-ia64/snort_1.8.4beta1-3.1_ia64.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-i386/snort_1.8.4beta1-3.1_i386.deb stable/main/binary-i386/snort-common_1.8.4beta1-3.1_i386.deb stable/main/binary-i386/snort-mysql_1.8.4beta1-3.1_i386.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-hppa/snort-common_1.8.4beta1-3.1_hppa.deb stable/main/binary-hppa/snort_1.8.4beta1-3.1_hppa.deb stable/main/binary-hppa/snort-mysql_1.8.4beta1-3.1_hppa.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-arm/snort-common_1.8.4beta1-3.1_arm.deb stable/main/binary-arm/snort-mysql_1.8.4beta1-3.1_arm.deb stable/main/binary-arm/snort_1.8.4beta1-3.1_arm.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/source/snort_1.8.4beta1-3.1.diff.gz stable/main/source/snort_1.8.4beta1-3.1.dsc stable/main/binary-alpha/snort-common_1.8.4beta1-3.1_alpha.deb stable/main/binary-all/snort-doc_1.8.4beta1-3.1_all.deb stable/main/binary-all/snort-rules-default_1.8.4beta1-3.1_all.deb stable/main/binary-alpha/snort-mysql_1.8.4beta1-3.1_alpha.deb stable/main/binary-alpha/snort_1.8.4beta1-3.1_alpha.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-s390/libsnmpkit2_0.9-4.woody.2_s390.deb stable/main/binary-s390/libsnmpkit-dev_0.9-4.woody.2_s390.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-powerpc/libsnmpkit2_0.9-4.woody.2_powerpc.deb stable/main/binary-powerpc/libsnmpkit-dev_0.9-4.woody.2_powerpc.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mipsel/libsnmpkit-dev_0.9-4.woody.2_mipsel.deb stable/main/binary-mipsel/libsnmpkit2_0.9-4.woody.2_mipsel.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mips/libsnmpkit2_0.9-4.woody.2_mips.deb stable/main/binary-mips/libsnmpkit-dev_0.9-4.woody.2_mips.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-m68k/libsnmpkit-dev_0.9-4.woody.2_m68k.deb stable/main/binary-m68k/libsnmpkit2_0.9-4.woody.2_m68k.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-ia64/libsnmpkit-dev_0.9-4.woody.2_ia64.deb stable/main/binary-ia64/libsnmpkit2_0.9-4.woody.2_ia64.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-i386/libsnmpkit-dev_0.9-4.woody.2_i386.deb stable/main/binary-i386/libsnmpkit2_0.9-4.woody.2_i386.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-hppa/libsnmpkit2_0.9-4.woody.2_hppa.deb stable/main/binary-hppa/libsnmpkit-dev_0.9-4.woody.2_hppa.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-arm/libsnmpkit-dev_0.9-4.woody.2_arm.deb stable/main/binary-arm/libsnmpkit2_0.9-4.woody.2_arm.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-alpha/libsnmpkit-dev_0.9-4.woody.2_alpha.deb stable/main/binary-alpha/libsnmpkit2_0.9-4.woody.2_alpha.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/source/snmpkit_0.9-4.woody.2.diff.gz stable/main/binary-sparc/libsnmpkit2_0.9-4.woody.2_sparc.deb stable/main/source/snmpkit_0.9-4.woody.2.dsc stable/main/binary-sparc/libsnmpkit-dev_0.9-4.woody.2_sparc.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-all/smb2www_980804-16.1_all.deb stable/main/source/smb2www_980804-16.1.dsc stable/main/source/smb2www_980804-16.1.diff.gz smb2www (980804-16.1) stable-security; urgency=high * Non-maintainer upload by the Security Team, authored by current maintainer + wrote the GetCmbOutput() function to fork new process and execute commands without using shell. + decode input query only in one place (in decode_query()). * Thanks to Robert Luberda stable/main/binary-s390/slocate_2.6-1.3.1_s390.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-powerpc/slocate_2.6-1.3.1_powerpc.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-mipsel/slocate_2.6-1.3.1_mipsel.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-mips/slocate_2.6-1.3.1_mips.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-m68k/slocate_2.6-1.3.1_m68k.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-ia64/slocate_2.6-1.3.1_ia64.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-i386/slocate_2.6-1.3.1_i386.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-hppa/slocate_2.6-1.3.1_hppa.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-arm/slocate_2.6-1.3.1_arm.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-alpha/slocate_2.6-1.3.1_alpha.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/source/slocate_2.6-1.3.1.dsc stable/main/source/slocate_2.6-1.3.1.diff.gz stable/main/binary-sparc/slocate_2.6-1.3.1_sparc.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-sparc/slashem_0.0.6E4F8-4.0woody3_sparc.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-s390/slashem_0.0.6E4F8-4.0woody3_s390.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-powerpc/slashem_0.0.6E4F8-4.0woody3_powerpc.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-mipsel/slashem_0.0.6E4F8-4.0woody3_mipsel.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-mips/slashem_0.0.6E4F8-4.0woody3_mips.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-m68k/slashem_0.0.6E4F8-4.0woody3_m68k.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-ia64/slashem_0.0.6E4F8-4.0woody3_ia64.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-hppa/slashem_0.0.6E4F8-4.0woody3_hppa.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-arm/slashem_0.0.6E4F8-4.0woody3_arm.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-alpha/slashem_0.0.6E4F8-4.0woody3_alpha.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-i386/slashem_0.0.6E4F8-4.0woody3_i386.deb stable/main/source/slashem_0.0.6E4F8-4.0woody3.dsc stable/main/source/slashem_0.0.6E4F8-4.0woody3.diff.gz slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-sparc/skkserv_10.62a-4woody1_sparc.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-s390/skkserv_10.62a-4woody1_s390.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-powerpc/skkserv_10.62a-4woody1_powerpc.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-mipsel/skkserv_10.62a-4woody1_mipsel.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-mips/skkserv_10.62a-4woody1_mips.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-m68k/skkserv_10.62a-4woody1_m68k.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-ia64/skkserv_10.62a-4woody1_ia64.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-hppa/skkserv_10.62a-4woody1_hppa.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-arm/skkserv_10.62a-4woody1_arm.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-alpha/skkserv_10.62a-4woody1_alpha.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/skk_10.62a-4woody1_all.deb stable/main/source/skk_10.62a-4woody1.dsc stable/main/binary-i386/skkserv_10.62a-4woody1_i386.deb stable/main/source/skk_10.62a-4woody1.diff.gz skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/shorewall_1.2.12-2_all.deb stable/main/source/shorewall_1.2.12-2.diff.gz stable/main/source/shorewall_1.2.12-2.dsc stable/main/binary-all/shorewall-doc_1.2.12-2_all.deb shorewall (1.2.12-2) stable; urgency=low * apply fix for shorewall not applying rate limiting, as defined in 'shorewall.conf' as 'LOGRATE' and 'LOGBURST', to the rfc1918 logging as it does with all other logging. This has denial of service potential on noisy networks. (closes: #206764) * dh_installinit is not used anymore to install the init script, it is installed by hand to avoid automatically startup and shutdown of the firewall during upgrade, install and remove. This should prevent network blackouts (closes: #165477) * the SUBSYSLOCK variable of shorewall.conf is set to "" because the initscript doesn't need it at all (closes: #209023) stable/main/binary-sparc/sendmail-wide_8.12.3+3.5Wbeta-5.5_sparc.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-s390/sendmail-wide_8.12.3+3.5Wbeta-5.5_s390.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-powerpc/sendmail-wide_8.12.3+3.5Wbeta-5.5_powerpc.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-mipsel/sendmail-wide_8.12.3+3.5Wbeta-5.5_mipsel.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-mips/sendmail-wide_8.12.3+3.5Wbeta-5.5_mips.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-m68k/sendmail-wide_8.12.3+3.5Wbeta-5.5_m68k.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-ia64/sendmail-wide_8.12.3+3.5Wbeta-5.5_ia64.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-hppa/sendmail-wide_8.12.3+3.5Wbeta-5.5_hppa.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-arm/sendmail-wide_8.12.3+3.5Wbeta-5.5_arm.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-alpha/sendmail-wide_8.12.3+3.5Wbeta-5.5_alpha.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.dsc stable/main/binary-i386/sendmail-wide_8.12.3+3.5Wbeta-5.5_i386.deb stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.diff.gz sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-sparc/libmilter-dev_8.12.3-6.6_sparc.deb stable/main/binary-sparc/sendmail_8.12.3-6.6_sparc.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-s390/sendmail_8.12.3-6.6_s390.deb stable/main/binary-s390/libmilter-dev_8.12.3-6.6_s390.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-powerpc/libmilter-dev_8.12.3-6.6_powerpc.deb stable/main/binary-powerpc/sendmail_8.12.3-6.6_powerpc.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-mipsel/sendmail_8.12.3-6.6_mipsel.deb stable/main/binary-mipsel/libmilter-dev_8.12.3-6.6_mipsel.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-mips/sendmail_8.12.3-6.6_mips.deb stable/main/binary-mips/libmilter-dev_8.12.3-6.6_mips.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-m68k/libmilter-dev_8.12.3-6.6_m68k.deb stable/main/binary-m68k/sendmail_8.12.3-6.6_m68k.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-ia64/sendmail_8.12.3-6.6_ia64.deb stable/main/binary-ia64/libmilter-dev_8.12.3-6.6_ia64.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-hppa/sendmail_8.12.3-6.6_hppa.deb stable/main/binary-hppa/libmilter-dev_8.12.3-6.6_hppa.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-arm/sendmail_8.12.3-6.6_arm.deb stable/main/binary-arm/libmilter-dev_8.12.3-6.6_arm.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-alpha/sendmail_8.12.3-6.6_alpha.deb stable/main/binary-alpha/libmilter-dev_8.12.3-6.6_alpha.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-all/sendmail-doc_8.12.3-6.6_all.deb stable/main/binary-i386/sendmail_8.12.3-6.6_i386.deb stable/main/binary-i386/libmilter-dev_8.12.3-6.6_i386.deb stable/main/source/sendmail_8.12.3-6.6.dsc stable/main/source/sendmail_8.12.3-6.6.diff.gz sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-all/semi_1.14.3.cvs.2001.08.10-1woody2_all.deb stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.dsc stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.diff.gz semi (1.14.3.cvs.2001.08.10-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Note CVE assignment in changelog (CAN-2003-0440) * No changes stable/main/binary-sparc/libsane_1.0.7-4_sparc.deb stable/main/binary-sparc/libsane-dev_1.0.7-4_sparc.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-s390/libsane_1.0.7-4_s390.deb stable/main/binary-s390/libsane-dev_1.0.7-4_s390.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-powerpc/libsane_1.0.7-4_powerpc.deb stable/main/binary-powerpc/libsane-dev_1.0.7-4_powerpc.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-mipsel/libsane_1.0.7-4_mipsel.deb stable/main/binary-mipsel/libsane-dev_1.0.7-4_mipsel.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-mips/libsane_1.0.7-4_mips.deb stable/main/binary-mips/libsane-dev_1.0.7-4_mips.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-m68k/libsane-dev_1.0.7-4_m68k.deb stable/main/binary-m68k/libsane_1.0.7-4_m68k.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-ia64/libsane_1.0.7-4_ia64.deb stable/main/binary-ia64/libsane-dev_1.0.7-4_ia64.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-hppa/libsane_1.0.7-4_hppa.deb stable/main/binary-hppa/libsane-dev_1.0.7-4_hppa.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-arm/libsane-dev_1.0.7-4_arm.deb stable/main/binary-arm/libsane_1.0.7-4_arm.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-alpha/libsane-dev_1.0.7-4_alpha.deb stable/main/binary-alpha/libsane_1.0.7-4_alpha.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-i386/libsane-dev_1.0.7-4_i386.deb stable/main/source/sane-backends_1.0.7-4.dsc stable/main/binary-i386/libsane_1.0.7-4_i386.deb stable/main/source/sane-backends_1.0.7-4.diff.gz sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-s390/swat_2.2.3a-12.3_s390.deb stable/main/binary-s390/smbclient_2.2.3a-12.3_s390.deb stable/main/binary-s390/libpam-smbpass_2.2.3a-12.3_s390.deb stable/main/binary-s390/libsmbclient-dev_2.2.3a-12.3_s390.deb stable/main/binary-s390/samba-common_2.2.3a-12.3_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-12.3_s390.deb stable/main/binary-s390/samba_2.2.3a-12.3_s390.deb stable/main/binary-s390/smbfs_2.2.3a-12.3_s390.deb stable/main/binary-s390/winbind_2.2.3a-12.3_s390.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/samba_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/winbind_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-12.3_powerpc.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/smbclient_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/smbfs_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/samba-common_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-12.3_mipsel.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-mips/swat_2.2.3a-12.3_mips.deb stable/main/binary-mips/winbind_2.2.3a-12.3_mips.deb stable/main/binary-mips/samba_2.2.3a-12.3_mips.deb stable/main/binary-mips/smbclient_2.2.3a-12.3_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-12.3_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-12.3_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-12.3_mips.deb stable/main/binary-mips/smbfs_2.2.3a-12.3_mips.deb stable/main/binary-mips/samba-common_2.2.3a-12.3_mips.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-m68k/samba-common_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/samba_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/winbind_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/swat_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/smbfs_2.2.3a-12.3_m68k.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-ia64/swat_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/samba_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/smbclient_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libsmbclient_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/smbfs_2.2.3a-12.3_ia64.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-i386/libpam-smbpass_2.2.3a-12.3_i386.deb stable/main/binary-i386/libsmbclient-dev_2.2.3a-12.3_i386.deb stable/main/binary-i386/smbfs_2.2.3a-12.3_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-12.3_i386.deb stable/main/binary-i386/smbclient_2.2.3a-12.3_i386.deb stable/main/binary-i386/samba-common_2.2.3a-12.3_i386.deb stable/main/binary-i386/samba_2.2.3a-12.3_i386.deb stable/main/binary-i386/winbind_2.2.3a-12.3_i386.deb stable/main/binary-i386/swat_2.2.3a-12.3_i386.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-hppa/samba_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/swat_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libsmbclient_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-12.3_hppa.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-arm/samba_2.2.3a-12.3_arm.deb stable/main/binary-arm/winbind_2.2.3a-12.3_arm.deb stable/main/binary-arm/smbfs_2.2.3a-12.3_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-12.3_arm.deb stable/main/binary-arm/smbclient_2.2.3a-12.3_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-12.3_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-12.3_arm.deb stable/main/binary-arm/swat_2.2.3a-12.3_arm.deb stable/main/binary-arm/samba-common_2.2.3a-12.3_arm.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-alpha/swat_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/samba_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/smbclient_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libpam-smbpass_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-12.3_alpha.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-sparc/libpam-smbpass_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-12.3_sparc.deb stable/main/source/samba_2.2.3a-12.3.dsc stable/main/binary-sparc/samba_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/swat_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12.3_sparc.deb stable/main/source/samba_2.2.3a-12.3.diff.gz stable/main/binary-sparc/samba-common_2.2.3a-12.3_sparc.deb stable/main/binary-all/samba-doc_2.2.3a-12.3_all.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-sparc/radiusd-cistron_1.6.6-1woody1_sparc.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-s390/radiusd-cistron_1.6.6-1woody1_s390.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-powerpc/radiusd-cistron_1.6.6-1woody1_powerpc.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-mipsel/radiusd-cistron_1.6.6-1woody1_mipsel.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-mips/radiusd-cistron_1.6.6-1woody1_mips.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-m68k/radiusd-cistron_1.6.6-1woody1_m68k.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-ia64/radiusd-cistron_1.6.6-1woody1_ia64.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-hppa/radiusd-cistron_1.6.6-1woody1_hppa.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-arm/radiusd-cistron_1.6.6-1woody1_arm.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-alpha/radiusd-cistron_1.6.6-1woody1_alpha.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/source/radiusd-cistron_1.6.6-1woody1.diff.gz stable/main/binary-i386/radiusd-cistron_1.6.6-1woody1_i386.deb stable/main/source/radiusd-cistron_1.6.6-1woody1.dsc radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-sparc/libproc-dev_2.0.7-8.woody1_sparc.deb stable/main/binary-sparc/procps_2.0.7-8.woody1_sparc.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-s390/libproc-dev_2.0.7-8.woody1_s390.deb stable/main/binary-s390/procps_2.0.7-8.woody1_s390.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-powerpc/libproc-dev_2.0.7-8.woody1_powerpc.deb stable/main/binary-powerpc/procps_2.0.7-8.woody1_powerpc.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-mipsel/procps_2.0.7-8.woody1_mipsel.deb stable/main/binary-mipsel/libproc-dev_2.0.7-8.woody1_mipsel.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-mips/libproc-dev_2.0.7-8.woody1_mips.deb stable/main/binary-mips/procps_2.0.7-8.woody1_mips.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-m68k/procps_2.0.7-8.woody1_m68k.deb stable/main/binary-m68k/libproc-dev_2.0.7-8.woody1_m68k.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-ia64/procps_2.0.7-8.woody1_ia64.deb stable/main/binary-ia64/libproc-dev_2.0.7-8.woody1_ia64.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-hppa/libproc-dev_2.0.7-8.woody1_hppa.deb stable/main/binary-hppa/procps_2.0.7-8.woody1_hppa.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-arm/procps_2.0.7-8.woody1_arm.deb stable/main/binary-arm/libproc-dev_2.0.7-8.woody1_arm.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-alpha/procps_2.0.7-8.woody1_alpha.deb stable/main/binary-alpha/libproc-dev_2.0.7-8.woody1_alpha.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/source/procps_2.0.7-8.woody1.dsc stable/main/source/procps_2.0.7-8.woody1.diff.gz stable/main/binary-i386/procps_2.0.7-8.woody1_i386.deb stable/main/binary-i386/libproc-dev_2.0.7-8.woody1_i386.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-sparc/procmail_3.22-5_sparc.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-s390/procmail_3.22-5_s390.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-powerpc/procmail_3.22-5_powerpc.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-mipsel/procmail_3.22-5_mipsel.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-mips/procmail_3.22-5_mips.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-m68k/procmail_3.22-5_m68k.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-ia64/procmail_3.22-5_ia64.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-hppa/procmail_3.22-5_hppa.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-arm/procmail_3.22-5_arm.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-alpha/procmail_3.22-5_alpha.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/source/procmail_3.22-5.dsc stable/main/binary-i386/procmail_3.22-5_i386.deb stable/main/source/procmail_3.22-5.diff.gz procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-s390/pptpd_1.1.2-1.4_s390.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-powerpc/pptpd_1.1.2-1.4_powerpc.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-mipsel/pptpd_1.1.2-1.4_mipsel.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-mips/pptpd_1.1.2-1.4_mips.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-m68k/pptpd_1.1.2-1.4_m68k.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-ia64/pptpd_1.1.2-1.4_ia64.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-i386/pptpd_1.1.2-1.4_i386.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-hppa/pptpd_1.1.2-1.4_hppa.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-arm/pptpd_1.1.2-1.4_arm.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-alpha/pptpd_1.1.2-1.4_alpha.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-sparc/pptpd_1.1.2-1.4_sparc.deb stable/main/source/pptpd_1.1.2-1.4.dsc stable/main/source/pptpd_1.1.2-1.4.diff.gz pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-sparc/postgresql-client_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql-dev_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgtcl_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libecpg3_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgperl_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/python-pygresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgsql2_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/pgaccess_7.2.1-2woody4_sparc.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-s390/postgresql-contrib_7.2.1-2woody4_s390.deb stable/main/binary-s390/libecpg3_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql-dev_7.2.1-2woody4_s390.deb stable/main/binary-s390/odbc-postgresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/python-pygresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql-client_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgtcl_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgsql2_7.2.1-2woody4_s390.deb stable/main/binary-s390/pgaccess_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgperl_7.2.1-2woody4_s390.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-powerpc/python-pygresql_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgsql2_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/pgaccess_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libecpg3_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgperl_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql_7.2.1-2woody4_powerpc.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-mipsel/pgaccess_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgsql2_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libecpg3_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgperl_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/python-pygresql_7.2.1-2woody4_mipsel.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-mips/postgresql_7.2.1-2woody4_mips.deb stable/main/binary-mips/libecpg3_7.2.1-2woody4_mips.deb stable/main/binary-mips/pgaccess_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-dev_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgtcl_7.2.1-2woody4_mips.deb stable/main/binary-mips/odbc-postgresql_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgsql2_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgperl_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-contrib_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-client_7.2.1-2woody4_mips.deb stable/main/binary-mips/python-pygresql_7.2.1-2woody4_mips.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-m68k/postgresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-dev_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/pgaccess_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-client_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/python-pygresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgperl_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgsql2_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libecpg3_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgtcl_7.2.1-2woody4_m68k.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-ia64/postgresql-dev_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libecpg3_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgperl_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/python-pygresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/pgaccess_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgtcl_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgsql2_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql-client_7.2.1-2woody4_ia64.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-hppa/postgresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-dev_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-client_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgperl_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/python-pygresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgsql2_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/pgaccess_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgtcl_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libecpg3_7.2.1-2woody4_hppa.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-arm/pgaccess_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-client_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-dev_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgsql2_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgtcl_7.2.1-2woody4_arm.deb stable/main/binary-arm/libecpg3_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-contrib_7.2.1-2woody4_arm.deb stable/main/binary-arm/python-pygresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/odbc-postgresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgperl_7.2.1-2woody4_arm.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-alpha/pgaccess_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/python-pygresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-dev_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-client_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgsql2_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgtcl_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgperl_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libecpg3_7.2.1-2woody4_alpha.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-i386/pgaccess_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgperl_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql-contrib_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgsql2_7.2.1-2woody4_i386.deb stable/main/binary-i386/python-pygresql_7.2.1-2woody4_i386.deb stable/main/source/postgresql_7.2.1-2woody4.dsc stable/main/binary-i386/odbc-postgresql_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgtcl_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql-dev_7.2.1-2woody4_i386.deb stable/main/source/postgresql_7.2.1-2woody4.diff.gz stable/main/binary-all/postgresql-doc_7.2.1-2woody4_all.deb stable/main/binary-i386/postgresql-client_7.2.1-2woody4_i386.deb stable/main/binary-i386/libecpg3_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql_7.2.1-2woody4_i386.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-sparc/postfix-mysql_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix-pcre_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix-ldap_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix_1.1.11-0.woody3_sparc.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-s390/postfix-pcre_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix-mysql_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix-ldap_1.1.11-0.woody3_s390.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-powerpc/postfix-ldap_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix-mysql_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix-pcre_1.1.11-0.woody3_powerpc.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-mipsel/postfix_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-ldap_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-pcre_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-mysql_1.1.11-0.woody3_mipsel.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-mips/postfix_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-ldap_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-pcre_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-mysql_1.1.11-0.woody3_mips.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-m68k/postfix-ldap_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix-mysql_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix-pcre_1.1.11-0.woody3_m68k.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-ia64/postfix-mysql_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix-ldap_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix-pcre_1.1.11-0.woody3_ia64.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-hppa/postfix_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-mysql_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-pcre_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-ldap_1.1.11-0.woody3_hppa.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-arm/postfix_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-mysql_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-pcre_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-ldap_1.1.11-0.woody3_arm.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-alpha/postfix-mysql_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix-pcre_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix-ldap_1.1.11-0.woody3_alpha.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-i386/postfix-pcre_1.1.11-0.woody3_i386.deb stable/main/binary-i386/postfix-mysql_1.1.11-0.woody3_i386.deb stable/main/binary-i386/postfix-ldap_1.1.11-0.woody3_i386.deb stable/main/source/postfix_1.1.11-0.woody3.dsc stable/main/source/postfix_1.1.11-0.woody3.diff.gz stable/main/binary-all/postfix-dev_1.1.11-0.woody3_all.deb stable/main/binary-i386/postfix_1.1.11-0.woody3_i386.deb stable/main/binary-all/postfix-doc_1.1.11-0.woody3_all.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody2_all.deb stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.dsc stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.diff.gz stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody2_all.deb phpgroupware (0.9.14-0.RC3.2.woody2) stable-security; urgency=high * Security fixes - Cross site scripting (CAN-2003-0504), see - sql insertion (CAN-2003-0657) - vfs storage in document dir now prohibited (CAN-2003-0599) - Remove $appdir in includes in tables_update.inc.php to prevent execution of arbitrary scripts. (These are the backports of the security fixes done upstream between version 0.9.14.003 and 0.9.14.006, see phpgroupware.org.) Closes: #201980. * Also: prohibit vfs storage in document dir in the old vfs class of filemanager product. stable/main/binary-sparc/php4-imap_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-gd_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mysql_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4_4.1.2-6woody3_sparc.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-s390/php4-mcal_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-mhash_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-gd_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-6woody3_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-curl_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-recode_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-imap_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-6woody3_s390.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-powerpc/php4-xslt_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-gd_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.1.2-6woody3_powerpc.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-mipsel/php4-gd_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-recode_4.1.2-6woody3_mipsel.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-mips/php4-cgi_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mhash_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-sybase_4.1.2-6woody3_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-gd_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-imap_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-curl_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-domxml_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-recode_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-6woody3_mips.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-m68k/php4-curl_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/caudium-php4_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-sybase_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-6woody3_m68k.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-ia64/php4-odbc_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-snmp_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-gd_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-xslt_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-6woody3_ia64.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-hppa/php4_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mcal_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-cgi_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-odbc_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-gd_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mysql_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-sybase_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-imap_4.1.2-6woody3_hppa.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-arm/php4-mhash_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-recode_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-imap_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-6woody3_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-curl_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-odbc_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-gd_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-6woody3_arm.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-alpha/php4-mcal_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-ldap_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-mhash_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-imap_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4_4.1.2-6woody3_alpha.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-i386/php4-mysql_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-recode_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-imap_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-snmp_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-cgi_4.1.2-6woody3_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-gd_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-xslt_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-6woody3_i386.deb stable/main/binary-all/php4-dev_4.1.2-6woody3_all.deb stable/main/binary-i386/php4-ldap_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-mcal_4.1.2-6woody3_i386.deb stable/main/source/php4_4.1.2-6woody3.diff.gz stable/main/binary-all/php4-pear_4.1.2-6woody3_all.deb stable/main/source/php4_4.1.2-6woody3.dsc stable/main/binary-i386/php4-curl_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-mhash_4.1.2-6woody3_i386.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-sparc/perl_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-suid_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-debug_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-base_5.6.1-8.3_sparc.deb stable/main/binary-sparc/libperl-dev_5.6.1-8.3_sparc.deb stable/main/binary-sparc/libperl5.6_5.6.1-8.3_sparc.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-s390/perl_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-base_5.6.1-8.3_s390.deb stable/main/binary-s390/libperl-dev_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-suid_5.6.1-8.3_s390.deb stable/main/binary-s390/libperl5.6_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-debug_5.6.1-8.3_s390.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-powerpc/perl-suid_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl-debug_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/libperl5.6_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl-base_5.6.1-8.3_powerpc.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-mipsel/perl-base_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl-debug_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/libperl5.6_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl-suid_5.6.1-8.3_mipsel.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-mips/perl-debug_5.6.1-8.3_mips.deb stable/main/binary-mips/libperl5.6_5.6.1-8.3_mips.deb stable/main/binary-mips/perl_5.6.1-8.3_mips.deb stable/main/binary-mips/perl-suid_5.6.1-8.3_mips.deb stable/main/binary-mips/libperl-dev_5.6.1-8.3_mips.deb stable/main/binary-mips/perl-base_5.6.1-8.3_mips.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-m68k/perl-debug_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl-suid_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl_5.6.1-8.3_m68k.deb stable/main/binary-m68k/libperl5.6_5.6.1-8.3_m68k.deb stable/main/binary-m68k/libperl-dev_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl-base_5.6.1-8.3_m68k.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-ia64/libperl5.6_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl_5.6.1-8.3_ia64.deb stable/main/binary-ia64/libperl-dev_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-base_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-suid_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-debug_5.6.1-8.3_ia64.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-hppa/perl-suid_5.6.1-8.3_hppa.deb stable/main/binary-hppa/libperl-dev_5.6.1-8.3_hppa.deb stable/main/binary-hppa/libperl5.6_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl-base_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl-debug_5.6.1-8.3_hppa.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-arm/perl-debug_5.6.1-8.3_arm.deb stable/main/binary-arm/libperl5.6_5.6.1-8.3_arm.deb stable/main/binary-arm/perl-suid_5.6.1-8.3_arm.deb stable/main/binary-arm/perl_5.6.1-8.3_arm.deb stable/main/binary-arm/perl-base_5.6.1-8.3_arm.deb stable/main/binary-arm/libperl-dev_5.6.1-8.3_arm.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-alpha/perl_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-suid_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-base_5.6.1-8.3_alpha.deb stable/main/binary-alpha/libperl-dev_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-debug_5.6.1-8.3_alpha.deb stable/main/binary-alpha/libperl5.6_5.6.1-8.3_alpha.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-i386/perl_5.6.1-8.3_i386.deb stable/main/source/perl_5.6.1-8.3.diff.gz stable/main/binary-all/libcgi-fast-perl_5.6.1-8.3_all.deb stable/main/binary-i386/perl-base_5.6.1-8.3_i386.deb stable/main/binary-all/perl-modules_5.6.1-8.3_all.deb stable/main/binary-i386/libperl-dev_5.6.1-8.3_i386.deb stable/main/binary-all/perl-doc_5.6.1-8.3_all.deb stable/main/binary-i386/libperl5.6_5.6.1-8.3_i386.deb stable/main/source/perl_5.6.1-8.3.dsc stable/main/binary-i386/perl-debug_5.6.1-8.3_i386.deb stable/main/binary-i386/perl-suid_5.6.1-8.3_i386.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-powerpc/pcmcia-cs_3.1.33-6woody1_powerpc.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-arm/pcmcia-cs_3.1.33-6woody1_arm.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-alpha/pcmcia-cs_3.1.33-6woody1_alpha.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/source/pcmcia-cs_3.1.33-6woody1.diff.gz stable/main/binary-i386/pcmcia-cs_3.1.33-6woody1_i386.deb stable/main/binary-all/pcmcia-source_3.1.33-6woody1_all.deb stable/main/source/pcmcia-cs_3.1.33-6woody1.dsc pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-sparc/orville-write_2.53-4woody1_sparc.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-s390/orville-write_2.53-4woody1_s390.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-powerpc/orville-write_2.53-4woody1_powerpc.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-mipsel/orville-write_2.53-4woody1_mipsel.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-mips/orville-write_2.53-4woody1_mips.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-m68k/orville-write_2.53-4woody1_m68k.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-ia64/orville-write_2.53-4woody1_ia64.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-hppa/orville-write_2.53-4woody1_hppa.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-arm/orville-write_2.53-4woody1_arm.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-alpha/orville-write_2.53-4woody1_alpha.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/source/orville-write_2.53-4woody1.dsc stable/main/source/orville-write_2.53-4woody1.diff.gz stable/main/binary-i386/orville-write_2.53-4woody1_i386.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-sparc/ssh-krb5_3.4p1-0woody4_sparc.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/ssh-krb5_3.4p1-0woody4_s390.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-powerpc/ssh-krb5_3.4p1-0woody4_powerpc.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mipsel/ssh-krb5_3.4p1-0woody4_mipsel.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mips/ssh-krb5_3.4p1-0woody4_mips.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-m68k/ssh-krb5_3.4p1-0woody4_m68k.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-ia64/ssh-krb5_3.4p1-0woody4_ia64.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-hppa/ssh-krb5_3.4p1-0woody4_hppa.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-arm/ssh-krb5_3.4p1-0woody4_arm.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-alpha/ssh-krb5_3.4p1-0woody4_alpha.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/source/openssh-krb5_3.4p1-0woody4.dsc stable/main/binary-i386/ssh-krb5_3.4p1-0woody4_i386.deb stable/main/source/openssh-krb5_3.4p1-0woody4.diff.gz openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-sparc/ssh_3.4p1-1.woody.3_sparc.deb stable/main/binary-sparc/ssh-askpass-gnome_3.4p1-1.woody.3_sparc.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/ssh_3.4p1-1.woody.3_s390.deb stable/main/binary-s390/ssh-askpass-gnome_3.4p1-1.woody.3_s390.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-powerpc/ssh_3.4p1-1.woody.3_powerpc.deb stable/main/binary-powerpc/ssh-askpass-gnome_3.4p1-1.woody.3_powerpc.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mipsel/ssh_3.4p1-1.woody.3_mipsel.deb stable/main/binary-mipsel/ssh-askpass-gnome_3.4p1-1.woody.3_mipsel.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mips/ssh_3.4p1-1.woody.3_mips.deb stable/main/binary-mips/ssh-askpass-gnome_3.4p1-1.woody.3_mips.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-m68k/ssh-askpass-gnome_3.4p1-1.woody.3_m68k.deb stable/main/binary-m68k/ssh_3.4p1-1.woody.3_m68k.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-ia64/ssh_3.4p1-1.woody.3_ia64.deb stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1.woody.3_ia64.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-hppa/ssh_3.4p1-1.woody.3_hppa.deb stable/main/binary-hppa/ssh-askpass-gnome_3.4p1-1.woody.3_hppa.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-arm/ssh-askpass-gnome_3.4p1-1.woody.3_arm.deb stable/main/binary-arm/ssh_3.4p1-1.woody.3_arm.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-alpha/ssh-askpass-gnome_3.4p1-1.woody.3_alpha.deb stable/main/binary-alpha/ssh_3.4p1-1.woody.3_alpha.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-i386/ssh-askpass-gnome_3.4p1-1.woody.3_i386.deb stable/main/source/openssh_3.4p1-1.woody.3.diff.gz stable/main/source/openssh_3.4p1-1.woody.3.dsc stable/main/binary-i386/ssh_3.4p1-1.woody.3_i386.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/slapd_2.0.23-6.3_s390.deb stable/main/binary-s390/ldap-gateways_2.0.23-6.3_s390.deb stable/main/binary-s390/libldap2-dev_2.0.23-6.3_s390.deb stable/main/binary-s390/libldap2_2.0.23-6.3_s390.deb stable/main/binary-s390/ldap-utils_2.0.23-6.3_s390.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-powerpc/libldap2_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/libldap2-dev_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/ldap-utils_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/ldap-gateways_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/slapd_2.0.23-6.3_powerpc.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-mipsel/libldap2-dev_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/ldap-utils_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/ldap-gateways_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/slapd_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/libldap2_2.0.23-6.3_mipsel.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-mips/slapd_2.0.23-6.3_mips.deb stable/main/binary-mips/libldap2-dev_2.0.23-6.3_mips.deb stable/main/binary-mips/ldap-gateways_2.0.23-6.3_mips.deb stable/main/binary-mips/libldap2_2.0.23-6.3_mips.deb stable/main/binary-mips/ldap-utils_2.0.23-6.3_mips.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-m68k/slapd_2.0.23-6.3_m68k.deb stable/main/binary-m68k/ldap-utils_2.0.23-6.3_m68k.deb stable/main/binary-m68k/libldap2_2.0.23-6.3_m68k.deb stable/main/binary-m68k/ldap-gateways_2.0.23-6.3_m68k.deb stable/main/binary-m68k/libldap2-dev_2.0.23-6.3_m68k.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-ia64/libldap2-dev_2.0.23-6.3_ia64.deb stable/main/binary-ia64/libldap2_2.0.23-6.3_ia64.deb stable/main/binary-ia64/slapd_2.0.23-6.3_ia64.deb stable/main/binary-ia64/ldap-utils_2.0.23-6.3_ia64.deb stable/main/binary-ia64/ldap-gateways_2.0.23-6.3_ia64.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-i386/ldap-utils_2.0.23-6.3_i386.deb stable/main/binary-i386/ldap-gateways_2.0.23-6.3_i386.deb stable/main/binary-i386/libldap2-dev_2.0.23-6.3_i386.deb stable/main/binary-i386/slapd_2.0.23-6.3_i386.deb stable/main/binary-i386/libldap2_2.0.23-6.3_i386.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-hppa/slapd_2.0.23-6.3_hppa.deb stable/main/binary-hppa/libldap2_2.0.23-6.3_hppa.deb stable/main/binary-hppa/ldap-utils_2.0.23-6.3_hppa.deb stable/main/binary-hppa/libldap2-dev_2.0.23-6.3_hppa.deb stable/main/binary-hppa/ldap-gateways_2.0.23-6.3_hppa.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-arm/ldap-gateways_2.0.23-6.3_arm.deb stable/main/binary-arm/slapd_2.0.23-6.3_arm.deb stable/main/binary-arm/libldap2-dev_2.0.23-6.3_arm.deb stable/main/binary-arm/ldap-utils_2.0.23-6.3_arm.deb stable/main/binary-arm/libldap2_2.0.23-6.3_arm.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-alpha/libldap2_2.0.23-6.3_alpha.deb stable/main/binary-alpha/slapd_2.0.23-6.3_alpha.deb stable/main/binary-alpha/ldap-gateways_2.0.23-6.3_alpha.deb stable/main/binary-alpha/libldap2-dev_2.0.23-6.3_alpha.deb stable/main/binary-alpha/ldap-utils_2.0.23-6.3_alpha.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-sparc/ldap-utils_2.0.23-6.3_sparc.deb stable/main/source/openldap2_2.0.23-6.3.diff.gz stable/main/binary-sparc/libldap2_2.0.23-6.3_sparc.deb stable/main/binary-sparc/ldap-gateways_2.0.23-6.3_sparc.deb stable/main/binary-sparc/slapd_2.0.23-6.3_sparc.deb stable/main/binary-sparc/libldap2-dev_2.0.23-6.3_sparc.deb stable/main/source/openldap2_2.0.23-6.3.dsc openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-s390/omega-rpg_0.90-pa9-7woody1_s390.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-powerpc/omega-rpg_0.90-pa9-7woody1_powerpc.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-mipsel/omega-rpg_0.90-pa9-7woody1_mipsel.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-mips/omega-rpg_0.90-pa9-7woody1_mips.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-m68k/omega-rpg_0.90-pa9-7woody1_m68k.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-ia64/omega-rpg_0.90-pa9-7woody1_ia64.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-i386/omega-rpg_0.90-pa9-7woody1_i386.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-hppa/omega-rpg_0.90-pa9-7woody1_hppa.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-arm/omega-rpg_0.90-pa9-7woody1_arm.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-alpha/omega-rpg_0.90-pa9-7woody1_alpha.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/source/omega-rpg_0.90-pa9-7woody1.diff.gz stable/main/binary-sparc/omega-rpg_0.90-pa9-7woody1_sparc.deb stable/main/source/omega-rpg_0.90-pa9-7woody1.dsc omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-sparc/nowebm_2.9a-7.3_sparc.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-s390/nowebm_2.9a-7.3_s390.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-powerpc/nowebm_2.9a-7.3_powerpc.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-mipsel/nowebm_2.9a-7.3_mipsel.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-mips/nowebm_2.9a-7.3_mips.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-m68k/nowebm_2.9a-7.3_m68k.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-hppa/nowebm_2.9a-7.3_hppa.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-arm/nowebm_2.9a-7.3_arm.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-alpha/nowebm_2.9a-7.3_alpha.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/source/noweb_2.9a-7.3.dsc stable/main/binary-i386/nowebm_2.9a-7.3_i386.deb stable/main/source/noweb_2.9a-7.3.diff.gz noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-s390/node_0.3.0a-2woody1_s390.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-powerpc/node_0.3.0a-2woody1_powerpc.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-mipsel/node_0.3.0a-2woody1_mipsel.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-mips/node_0.3.0a-2woody1_mips.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-m68k/node_0.3.0a-2woody1_m68k.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-ia64/node_0.3.0a-2woody1_ia64.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-i386/node_0.3.0a-2woody1_i386.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-hppa/node_0.3.0a-2woody1_hppa.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-arm/node_0.3.0a-2woody1_arm.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-alpha/node_0.3.0a-2woody1_alpha.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/source/node_0.3.0a-2woody1.diff.gz stable/main/binary-sparc/node_0.3.0a-2woody1_sparc.deb stable/main/source/node_0.3.0a-2woody1.dsc node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-sparc/netris_0.5-4woody1_sparc.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-s390/netris_0.5-4woody1_s390.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-powerpc/netris_0.5-4woody1_powerpc.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-mipsel/netris_0.5-4woody1_mipsel.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-mips/netris_0.5-4woody1_mips.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-m68k/netris_0.5-4woody1_m68k.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-ia64/netris_0.5-4woody1_ia64.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-hppa/netris_0.5-4woody1_hppa.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-arm/netris_0.5-4woody1_arm.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-alpha/netris_0.5-4woody1_alpha.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/source/netris_0.5-4woody1.diff.gz stable/main/binary-i386/netris_0.5-4woody1_i386.deb stable/main/source/netris_0.5-4woody1.dsc netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-sparc/libnetpbm9-dev_9.20-8.2_sparc.deb stable/main/binary-sparc/libnetpbm9_9.20-8.2_sparc.deb stable/main/binary-sparc/netpbm_9.20-8.2_sparc.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-s390/libnetpbm9-dev_9.20-8.2_s390.deb stable/main/binary-s390/libnetpbm9_9.20-8.2_s390.deb stable/main/binary-s390/netpbm_9.20-8.2_s390.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.2_powerpc.deb stable/main/binary-powerpc/libnetpbm9_9.20-8.2_powerpc.deb stable/main/binary-powerpc/netpbm_9.20-8.2_powerpc.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.2_mipsel.deb stable/main/binary-mipsel/libnetpbm9_9.20-8.2_mipsel.deb stable/main/binary-mipsel/netpbm_9.20-8.2_mipsel.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-mips/netpbm_9.20-8.2_mips.deb stable/main/binary-mips/libnetpbm9_9.20-8.2_mips.deb stable/main/binary-mips/libnetpbm9-dev_9.20-8.2_mips.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-m68k/netpbm_9.20-8.2_m68k.deb stable/main/binary-m68k/libnetpbm9-dev_9.20-8.2_m68k.deb stable/main/binary-m68k/libnetpbm9_9.20-8.2_m68k.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-ia64/netpbm_9.20-8.2_ia64.deb stable/main/binary-ia64/libnetpbm9_9.20-8.2_ia64.deb stable/main/binary-ia64/libnetpbm9-dev_9.20-8.2_ia64.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-i386/libnetpbm9-dev_9.20-8.2_i386.deb stable/main/binary-i386/libnetpbm9_9.20-8.2_i386.deb stable/main/binary-i386/netpbm_9.20-8.2_i386.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-arm/netpbm_9.20-8.2_arm.deb stable/main/binary-arm/libnetpbm9_9.20-8.2_arm.deb stable/main/binary-arm/libnetpbm9-dev_9.20-8.2_arm.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-alpha/netpbm_9.20-8.2_alpha.deb stable/main/binary-alpha/libnetpbm9_9.20-8.2_alpha.deb stable/main/binary-alpha/libnetpbm9-dev_9.20-8.2_alpha.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/source/netpbm-free_9.20-8.2.diff.gz stable/main/binary-hppa/libnetpbm9_9.20-8.2_hppa.deb stable/main/binary-hppa/netpbm_9.20-8.2_hppa.deb stable/main/source/netpbm-free_9.20-8.2.dsc stable/main/binary-hppa/libnetpbm9-dev_9.20-8.2_hppa.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-sparc/nano_1.0.6-3_sparc.deb stable/main/binary-sparc/nano-udeb_1.0.6-3_sparc.udeb stable/main/binary-sparc/nano-tiny_1.0.6-3_sparc.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-s390/nano-tiny_1.0.6-3_s390.deb stable/main/binary-s390/nano-udeb_1.0.6-3_s390.udeb stable/main/binary-s390/nano_1.0.6-3_s390.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-powerpc/nano_1.0.6-3_powerpc.deb stable/main/binary-powerpc/nano-tiny_1.0.6-3_powerpc.deb stable/main/binary-powerpc/nano-udeb_1.0.6-3_powerpc.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-mipsel/nano-tiny_1.0.6-3_mipsel.deb stable/main/binary-mipsel/nano_1.0.6-3_mipsel.deb stable/main/binary-mipsel/nano-udeb_1.0.6-3_mipsel.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-mips/nano-tiny_1.0.6-3_mips.deb stable/main/binary-mips/nano_1.0.6-3_mips.deb stable/main/binary-mips/nano-udeb_1.0.6-3_mips.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-m68k/nano_1.0.6-3_m68k.deb stable/main/binary-m68k/nano-tiny_1.0.6-3_m68k.deb stable/main/binary-m68k/nano-udeb_1.0.6-3_m68k.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-ia64/nano-tiny_1.0.6-3_ia64.deb stable/main/binary-ia64/nano_1.0.6-3_ia64.deb stable/main/binary-ia64/nano-udeb_1.0.6-3_ia64.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-hppa/nano-udeb_1.0.6-3_hppa.udeb stable/main/binary-hppa/nano-tiny_1.0.6-3_hppa.deb stable/main/binary-hppa/nano_1.0.6-3_hppa.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-arm/nano-udeb_1.0.6-3_arm.udeb stable/main/binary-arm/nano-tiny_1.0.6-3_arm.deb stable/main/binary-arm/nano_1.0.6-3_arm.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-alpha/nano-tiny_1.0.6-3_alpha.deb stable/main/binary-alpha/nano-udeb_1.0.6-3_alpha.udeb stable/main/binary-alpha/nano_1.0.6-3_alpha.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-i386/nano-udeb_1.0.6-3_i386.udeb stable/main/source/nano_1.0.6-3.diff.gz stable/main/binary-i386/nano_1.0.6-3_i386.deb stable/main/binary-i386/nano-tiny_1.0.6-3_i386.deb stable/main/source/nano_1.0.6-3.dsc nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-s390/mutt_1.3.28-2.2_s390.deb stable/main/binary-s390/mutt-utf8_1.3.28-2.2_s390.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-powerpc/mutt-utf8_1.3.28-2.2_powerpc.deb stable/main/binary-powerpc/mutt_1.3.28-2.2_powerpc.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-mipsel/mutt-utf8_1.3.28-2.2_mipsel.deb stable/main/binary-mipsel/mutt_1.3.28-2.2_mipsel.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-mips/mutt_1.3.28-2.2_mips.deb stable/main/binary-mips/mutt-utf8_1.3.28-2.2_mips.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-m68k/mutt-utf8_1.3.28-2.2_m68k.deb stable/main/binary-m68k/mutt_1.3.28-2.2_m68k.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-ia64/mutt-utf8_1.3.28-2.2_ia64.deb stable/main/binary-ia64/mutt_1.3.28-2.2_ia64.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-i386/mutt-utf8_1.3.28-2.2_i386.deb stable/main/binary-i386/mutt_1.3.28-2.2_i386.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-hppa/mutt_1.3.28-2.2_hppa.deb stable/main/binary-hppa/mutt-utf8_1.3.28-2.2_hppa.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-arm/mutt_1.3.28-2.2_arm.deb stable/main/binary-arm/mutt-utf8_1.3.28-2.2_arm.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-alpha/mutt_1.3.28-2.2_alpha.deb stable/main/binary-alpha/mutt-utf8_1.3.28-2.2_alpha.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/source/mutt_1.3.28-2.2.dsc stable/main/source/mutt_1.3.28-2.2.diff.gz stable/main/binary-sparc/mutt-utf8_1.3.28-2.2_sparc.deb stable/main/binary-sparc/mutt_1.3.28-2.2_sparc.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-sparc/mozart_1.2.3.20011204-3woody1_sparc.deb stable/main/binary-sparc/mozart-contrib_1.2.3.20011204-3woody1_sparc.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-powerpc/mozart-contrib_1.2.3.20011204-3woody1_powerpc.deb stable/main/binary-powerpc/mozart_1.2.3.20011204-3woody1_powerpc.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-m68k/mozart_1.2.3.20011204-3woody1_m68k.deb stable/main/binary-m68k/mozart-contrib_1.2.3.20011204-3woody1_m68k.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-i386/mozart-contrib_1.2.3.20011204-3woody1_i386.deb stable/main/binary-all/mozart-doc-html_1.2.3.20011204-3woody1_all.deb stable/main/binary-i386/mozart_1.2.3.20011204-3woody1_i386.deb stable/main/source/mozart_1.2.3.20011204-3woody1.dsc stable/main/source/mozart_1.2.3.20011204-3woody1.diff.gz mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-s390/xftp_2.2-18.1_s390.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-powerpc/xftp_2.2-18.1_powerpc.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-mipsel/xftp_2.2-18.1_mipsel.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-mips/xftp_2.2-18.1_mips.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-m68k/xftp_2.2-18.1_m68k.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-ia64/xftp_2.2-18.1_ia64.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-i386/xftp_2.2-18.1_i386.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-hppa/xftp_2.2-18.1_hppa.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-arm/xftp_2.2-18.1_arm.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-alpha/xftp_2.2-18.1_alpha.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/source/moxftp_2.2-18.1.dsc stable/main/source/moxftp_2.2-18.1.diff.gz stable/main/binary-sparc/xftp_2.2-18.1_sparc.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/source/minimalist_2.2-4.dsc stable/main/source/minimalist_2.2-4.diff.gz stable/main/binary-all/minimalist_2.2-4_all.deb minimalist (2.2-4) stable-security; urgency=low * Added check to getAuth function that prevents remote code execution (CVE CAN-2003-0902) (Closes: Bug#218364) stable/main/source/mindi_0.58.r5-1woody1.dsc stable/main/binary-i386/mindi_0.58.r5-1woody1_i386.deb stable/main/source/mindi_0.58.r5-1woody1.diff.gz mindi (0.58.r5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jakob.Lell@web.de to create temporary files securely (CAN-2003-0617) [mindi] stable/main/source/mime-support_3.18-1.3.dsc stable/main/binary-all/mime-support_3.18-1.3_all.deb stable/main/source/mime-support_3.18-1.3.tar.gz mime-support (3.18-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Florian Zumbiehl to fix shell character expansion finally. stable/main/binary-sparc/mikmod_3.1.6-4woody3_sparc.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-s390/mikmod_3.1.6-4woody3_s390.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-powerpc/mikmod_3.1.6-4woody3_powerpc.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-mipsel/mikmod_3.1.6-4woody3_mipsel.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-mips/mikmod_3.1.6-4woody3_mips.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-m68k/mikmod_3.1.6-4woody3_m68k.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-ia64/mikmod_3.1.6-4woody3_ia64.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-hppa/mikmod_3.1.6-4woody3_hppa.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-arm/mikmod_3.1.6-4woody3_arm.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-alpha/mikmod_3.1.6-4woody3_alpha.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/source/mikmod_3.1.6-4woody3.diff.gz stable/main/source/mikmod_3.1.6-4woody3.dsc stable/main/binary-i386/mikmod_3.1.6-4woody3_i386.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/source/mhonarc_2.5.2-1.3.dsc stable/main/source/mhonarc_2.5.2-1.3.diff.gz stable/main/binary-all/mhonarc_2.5.2-1.3_all.deb mhonarc (2.5.2-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix another cross site scripting problem stable/main/binary-s390/mhc-utils_0.25+20010625-7.1_s390.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-powerpc/mhc-utils_0.25+20010625-7.1_powerpc.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-mipsel/mhc-utils_0.25+20010625-7.1_mipsel.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-mips/mhc-utils_0.25+20010625-7.1_mips.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-ia64/mhc-utils_0.25+20010625-7.1_ia64.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-i386/mhc-utils_0.25+20010625-7.1_i386.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-hppa/mhc-utils_0.25+20010625-7.1_hppa.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-arm/mhc-utils_0.25+20010625-7.1_arm.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-alpha/mhc-utils_0.25+20010625-7.1_alpha.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-m68k/mhc-utils_0.25+20010625-7.1_m68k.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/source/mhc_0.25+20010625-7.1.dsc stable/main/binary-sparc/mhc-utils_0.25+20010625-7.1_sparc.deb stable/main/binary-all/mhc_0.25+20010625-7.1_all.deb stable/main/source/mhc_0.25+20010625-7.1.diff.gz mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-sparc/marbles_1.0.2-1woody1_sparc.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-s390/marbles_1.0.2-1woody1_s390.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-powerpc/marbles_1.0.2-1woody1_powerpc.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-mipsel/marbles_1.0.2-1woody1_mipsel.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-mips/marbles_1.0.2-1woody1_mips.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-m68k/marbles_1.0.2-1woody1_m68k.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-ia64/marbles_1.0.2-1woody1_ia64.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-hppa/marbles_1.0.2-1woody1_hppa.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-arm/marbles_1.0.2-1woody1_arm.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-alpha/marbles_1.0.2-1woody1_alpha.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/source/marbles_1.0.2-1woody1.dsc stable/main/source/marbles_1.0.2-1woody1.diff.gz stable/main/binary-i386/marbles_1.0.2-1woody1_i386.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-sparc/man-db_2.3.20-18.woody.4_sparc.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-s390/man-db_2.3.20-18.woody.4_s390.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-powerpc/man-db_2.3.20-18.woody.4_powerpc.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-mipsel/man-db_2.3.20-18.woody.4_mipsel.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-mips/man-db_2.3.20-18.woody.4_mips.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-m68k/man-db_2.3.20-18.woody.4_m68k.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-ia64/man-db_2.3.20-18.woody.4_ia64.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-hppa/man-db_2.3.20-18.woody.4_hppa.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-arm/man-db_2.3.20-18.woody.4_arm.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-alpha/man-db_2.3.20-18.woody.4_alpha.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/source/man-db_2.3.20-18.woody.4.diff.gz stable/main/binary-i386/man-db_2.3.20-18.woody.4_i386.deb stable/main/source/man-db_2.3.20-18.woody.4.dsc man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-sparc/mah-jong_1.4-2_sparc.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-s390/mah-jong_1.4-2_s390.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-powerpc/mah-jong_1.4-2_powerpc.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-mipsel/mah-jong_1.4-2_mipsel.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-mips/mah-jong_1.4-2_mips.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-m68k/mah-jong_1.4-2_m68k.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-ia64/mah-jong_1.4-2_ia64.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-hppa/mah-jong_1.4-2_hppa.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-arm/mah-jong_1.4-2_arm.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-alpha/mah-jong_1.4-2_alpha.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/source/mah-jong_1.4-2.diff.gz stable/main/source/mah-jong_1.4-2.dsc stable/main/binary-i386/mah-jong_1.4-2_i386.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-sparc/lyskom-server_2.0.6-1woody1_sparc.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-s390/lyskom-server_2.0.6-1woody1_s390.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-powerpc/lyskom-server_2.0.6-1woody1_powerpc.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-mipsel/lyskom-server_2.0.6-1woody1_mipsel.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-mips/lyskom-server_2.0.6-1woody1_mips.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-m68k/lyskom-server_2.0.6-1woody1_m68k.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-ia64/lyskom-server_2.0.6-1woody1_ia64.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-hppa/lyskom-server_2.0.6-1woody1_hppa.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-arm/lyskom-server_2.0.6-1woody1_arm.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-alpha/lyskom-server_2.0.6-1woody1_alpha.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-i386/lyskom-server_2.0.6-1woody1_i386.deb stable/main/source/lyskom-server_2.0.6-1woody1.dsc stable/main/source/lyskom-server_2.0.6-1woody1.diff.gz lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-sparc/lv_4.49.4-7woody2_sparc.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-s390/lv_4.49.4-7woody2_s390.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-powerpc/lv_4.49.4-7woody2_powerpc.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-mipsel/lv_4.49.4-7woody2_mipsel.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-mips/lv_4.49.4-7woody2_mips.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-m68k/lv_4.49.4-7woody2_m68k.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-ia64/lv_4.49.4-7woody2_ia64.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-hppa/lv_4.49.4-7woody2_hppa.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-arm/lv_4.49.4-7woody2_arm.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-alpha/lv_4.49.4-7woody2_alpha.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/source/lv_4.49.4-7woody2.dsc stable/main/binary-i386/lv_4.49.4-7woody2_i386.deb stable/main/source/lv_4.49.4-7woody2.diff.gz lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-sparc/lprng_3.8.10-1.2_sparc.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-s390/lprng_3.8.10-1.2_s390.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-powerpc/lprng_3.8.10-1.2_powerpc.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mipsel/lprng_3.8.10-1.2_mipsel.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mips/lprng_3.8.10-1.2_mips.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-m68k/lprng_3.8.10-1.2_m68k.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-ia64/lprng_3.8.10-1.2_ia64.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-i386/lprng_3.8.10-1.2_i386.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-hppa/lprng_3.8.10-1.2_hppa.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-arm/lprng_3.8.10-1.2_arm.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/source/lprng_3.8.10-1.2.dsc stable/main/binary-all/lprng-doc_3.8.10-1.2_all.deb stable/main/binary-alpha/lprng_3.8.10-1.2_alpha.deb stable/main/source/lprng_3.8.10-1.2.diff.gz lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-sparc/liece-dcc_2.0+0.20020217cvs-2.1_sparc.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-s390/liece-dcc_2.0+0.20020217cvs-2.1_s390.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-powerpc/liece-dcc_2.0+0.20020217cvs-2.1_powerpc.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-mipsel/liece-dcc_2.0+0.20020217cvs-2.1_mipsel.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-mips/liece-dcc_2.0+0.20020217cvs-2.1_mips.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-m68k/liece-dcc_2.0+0.20020217cvs-2.1_m68k.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-ia64/liece-dcc_2.0+0.20020217cvs-2.1_ia64.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-hppa/liece-dcc_2.0+0.20020217cvs-2.1_hppa.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-arm/liece-dcc_2.0+0.20020217cvs-2.1_arm.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-alpha/liece-dcc_2.0+0.20020217cvs-2.1_alpha.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-i386/liece-dcc_2.0+0.20020217cvs-2.1_i386.deb stable/main/binary-all/liece_2.0+0.20020217cvs-2.1_all.deb stable/main/source/liece_2.0+0.20020217cvs-2.1.dsc stable/main/source/liece_2.0+0.20020217cvs-2.1.diff.gz liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-s390/libprinterconf0_0.5-4.woody.2_s390.deb stable/main/binary-s390/pconf-detect_0.5-4.woody.2_s390.deb stable/main/binary-s390/libprinterconf-dev_0.5-4.woody.2_s390.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-powerpc/libprinterconf-dev_0.5-4.woody.2_powerpc.deb stable/main/binary-powerpc/libprinterconf0_0.5-4.woody.2_powerpc.deb stable/main/binary-powerpc/pconf-detect_0.5-4.woody.2_powerpc.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mipsel/libprinterconf0_0.5-4.woody.2_mipsel.deb stable/main/binary-mipsel/libprinterconf-dev_0.5-4.woody.2_mipsel.deb stable/main/binary-mipsel/pconf-detect_0.5-4.woody.2_mipsel.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mips/libprinterconf-dev_0.5-4.woody.2_mips.deb stable/main/binary-mips/libprinterconf0_0.5-4.woody.2_mips.deb stable/main/binary-mips/pconf-detect_0.5-4.woody.2_mips.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-m68k/libprinterconf-dev_0.5-4.woody.2_m68k.deb stable/main/binary-m68k/pconf-detect_0.5-4.woody.2_m68k.deb stable/main/binary-m68k/libprinterconf0_0.5-4.woody.2_m68k.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-ia64/libprinterconf0_0.5-4.woody.2_ia64.deb stable/main/binary-ia64/libprinterconf-dev_0.5-4.woody.2_ia64.deb stable/main/binary-ia64/pconf-detect_0.5-4.woody.2_ia64.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-i386/pconf-detect_0.5-4.woody.2_i386.deb stable/main/binary-i386/libprinterconf0_0.5-4.woody.2_i386.deb stable/main/binary-i386/libprinterconf-dev_0.5-4.woody.2_i386.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-hppa/libprinterconf0_0.5-4.woody.2_hppa.deb stable/main/binary-hppa/pconf-detect_0.5-4.woody.2_hppa.deb stable/main/binary-hppa/libprinterconf-dev_0.5-4.woody.2_hppa.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-arm/pconf-detect_0.5-4.woody.2_arm.deb stable/main/binary-arm/libprinterconf0_0.5-4.woody.2_arm.deb stable/main/binary-arm/libprinterconf-dev_0.5-4.woody.2_arm.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-alpha/pconf-detect_0.5-4.woody.2_alpha.deb stable/main/binary-alpha/libprinterconf0_0.5-4.woody.2_alpha.deb stable/main/binary-alpha/libprinterconf-dev_0.5-4.woody.2_alpha.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-sparc/libprinterconf0_0.5-4.woody.2_sparc.deb stable/main/source/libprinterconf_0.5-4.woody.2.dsc stable/main/binary-sparc/libprinterconf-dev_0.5-4.woody.2_sparc.deb stable/main/source/libprinterconf_0.5-4.woody.2.diff.gz stable/main/binary-sparc/pconf-detect_0.5-4.woody.2_sparc.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-s390/libpng3_1.2.1-1.1.woody.3_s390.deb stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.3_s390.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.3_powerpc.deb stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.3_powerpc.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.3_mipsel.deb stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.3_mipsel.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mips/libpng3_1.2.1-1.1.woody.3_mips.deb stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.3_mips.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.3_m68k.deb stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.3_m68k.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.3_ia64.deb stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.3_ia64.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.3_i386.deb stable/main/binary-i386/libpng3_1.2.1-1.1.woody.3_i386.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.3_hppa.deb stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.3_hppa.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-arm/libpng3_1.2.1-1.1.woody.3_arm.deb stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.3_arm.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.3_alpha.deb stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.3_alpha.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.3_sparc.deb stable/main/source/libpng3_1.2.1-1.1.woody.3.diff.gz stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.3_sparc.deb stable/main/source/libpng3_1.2.1-1.1.woody.3.dsc libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-s390/libpng2_1.0.12-3.woody.3_s390.deb stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.3_s390.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.3_powerpc.deb stable/main/binary-powerpc/libpng2_1.0.12-3.woody.3_powerpc.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mipsel/libpng2_1.0.12-3.woody.3_mipsel.deb stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.3_mipsel.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mips/libpng2_1.0.12-3.woody.3_mips.deb stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.3_mips.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.3_m68k.deb stable/main/binary-m68k/libpng2_1.0.12-3.woody.3_m68k.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-ia64/libpng2_1.0.12-3.woody.3_ia64.deb stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.3_ia64.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.3_i386.deb stable/main/binary-i386/libpng2_1.0.12-3.woody.3_i386.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-hppa/libpng2_1.0.12-3.woody.3_hppa.deb stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.3_hppa.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-arm/libpng2_1.0.12-3.woody.3_arm.deb stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.3_arm.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-alpha/libpng2_1.0.12-3.woody.3_alpha.deb stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.3_alpha.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/source/libpng_1.0.12-3.woody.3.dsc stable/main/source/libpng_1.0.12-3.woody.3.diff.gz stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.3_sparc.deb stable/main/binary-sparc/libpng2_1.0.12-3.woody.3_sparc.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-all/libphp-adodb_1.51-1.1_all.deb stable/main/source/libphp-adodb_1.51-1.1.dsc stable/main/source/libphp-adodb_1.51-1.1.diff.gz libphp-adodb (1.51-1.1) stable; urgency=low * Fix GetUpdateSQL() function problem. (Closes: #177332) Old function will update all datasets in the table, because the where statement wasn't created correctly. * Change maintainer name. stable/main/binary-sparc/libparagui1.0_0.1.0-1_sparc.deb stable/main/binary-sparc/libparagui1.0-dev_0.1.0-1_sparc.deb stable/main/binary-sparc/paragui-themes_0.1.0-1_sparc.deb libparagui1.0 (0.1.0-1) unstable; urgency=low * Initial Release (Closes: #109099) * added patch that let's paragui-config report /usr/include/paragui-1.0 as the include directory stable/main/binary-sparc/libpam-smb_1.1.6-1.1woody1_sparc.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-s390/libpam-smb_1.1.6-1.1woody1_s390.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-powerpc/libpam-smb_1.1.6-1.1woody1_powerpc.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-mipsel/libpam-smb_1.1.6-1.1woody1_mipsel.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-mips/libpam-smb_1.1.6-1.1woody1_mips.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-m68k/libpam-smb_1.1.6-1.1woody1_m68k.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-ia64/libpam-smb_1.1.6-1.1woody1_ia64.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-hppa/libpam-smb_1.1.6-1.1woody1_hppa.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-arm/libpam-smb_1.1.6-1.1woody1_arm.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-alpha/libpam-smb_1.1.6-1.1woody1_alpha.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/source/libpam-smb_1.1.6-1.1woody1.diff.gz stable/main/binary-i386/libpam-smb_1.1.6-1.1woody1_i386.deb stable/main/source/libpam-smb_1.1.6-1.1woody1.dsc libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/source/libmailtools-perl_1.44-1woody2.dsc stable/main/binary-all/libmailtools-perl_1.44-1woody2_all.deb stable/main/binary-all/mailtools_1.44-1woody2_all.deb stable/main/source/libmailtools-perl_1.44-1woody2.diff.gz libmailtools-perl (1.44-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove the 'mail' mailer entirely, as it is problematic. This was the approach taken upstream and by other vendors, and as far as I can tell, no program specifically requests this buggy type of mailer interface (CAN-2002-1271) stable/main/binary-sparc/liblocale-gettext-perl_1.01-11a.woody_sparc.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-s390/liblocale-gettext-perl_1.01-11a.woody_s390.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-powerpc/liblocale-gettext-perl_1.01-11a.woody_powerpc.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-mipsel/liblocale-gettext-perl_1.01-11a.woody_mipsel.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-mips/liblocale-gettext-perl_1.01-11a.woody_mips.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-m68k/liblocale-gettext-perl_1.01-11a.woody_m68k.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-ia64/liblocale-gettext-perl_1.01-11a.woody_ia64.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-hppa/liblocale-gettext-perl_1.01-11a.woody_hppa.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-arm/liblocale-gettext-perl_1.01-11a.woody_arm.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-alpha/liblocale-gettext-perl_1.01-11a.woody_alpha.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/source/liblocale-gettext-perl_1.01-11a.woody.dsc stable/main/binary-i386/liblocale-gettext-perl_1.01-11a.woody_i386.deb stable/main/source/liblocale-gettext-perl_1.01-11a.woody.diff.gz liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-ia64/libdbd-mysql-perl_1.2216-2.0.1_ia64.deb libdbd-mysql-perl (1.2216-2.0.1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild for ia64: Closes: #191552 stable/main/binary-sparc/leksbot_1.2-3.1woody1_sparc.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-s390/leksbot_1.2-3.1woody1_s390.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-powerpc/leksbot_1.2-3.1woody1_powerpc.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-mipsel/leksbot_1.2-3.1woody1_mipsel.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-mips/leksbot_1.2-3.1woody1_mips.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-m68k/leksbot_1.2-3.1woody1_m68k.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-ia64/leksbot_1.2-3.1woody1_ia64.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-hppa/leksbot_1.2-3.1woody1_hppa.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-arm/leksbot_1.2-3.1woody1_arm.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-alpha/leksbot_1.2-3.1woody1_alpha.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/source/leksbot_1.2-3.1woody1.diff.gz stable/main/source/leksbot_1.2-3.1woody1.dsc stable/main/binary-i386/leksbot_1.2-3.1woody1_i386.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-s390/krb5-kdc_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkrb5-dev_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-admin-server_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody4_s390.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkrb53_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkadm55_1.2.4-5woody4_powerpc.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-mipsel/krb5-clients_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkadm55_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkrb53_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody4_mipsel.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkrb53_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkadm55_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody4_mips.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-m68k/krb5-user_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-kdc_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody4_m68k.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-ia64/libkadm55_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/libkrb53_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody4_ia64.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-i386/krb5-clients_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-ftpd_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkrb5-dev_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-telnetd_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkrb53_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody4_i386.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-hppa/krb5-kdc_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkrb53_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkadm55_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody4_hppa.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-arm/krb5-user_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-admin-server_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-kdc_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-telnetd_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody4_arm.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-user_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody4_alpha.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody4_sparc.deb stable/main/source/krb5_1.2.4-5woody4.dsc stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody4_sparc.deb stable/main/binary-all/krb5-doc_1.2.4-5woody4_all.deb stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody4_sparc.deb stable/main/source/krb5_1.2.4-5woody4.diff.gz stable/main/binary-sparc/libkadm55_1.2.4-5woody4_sparc.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-all/kernel-doc-2.4.18_2.4.18-13_all.deb stable/main/source/kernel-source-2.4.18_2.4.18-13.diff.gz stable/main/binary-all/kernel-source-2.4.18_2.4.18-13_all.deb stable/main/source/kernel-source-2.4.18_2.4.18-13.dsc kernel-source-2.4.18 (2.4.18-13) stable-security; urgency=high * Fixed steal_locks race introduced in 2.4.18-10: . fs/binfmt_elf.c . fs/exec.c stable/main/binary-sparc/mkcramfs_2.4.17-1woody1_sparc.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-s390/mkcramfs_2.4.17-1woody1_s390.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-powerpc/mkcramfs_2.4.17-1woody1_powerpc.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mipsel/mkcramfs_2.4.17-1woody1_mipsel.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mips/mkcramfs_2.4.17-1woody1_mips.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-m68k/mkcramfs_2.4.17-1woody1_m68k.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-ia64/mkcramfs_2.4.17-1woody1_ia64.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-hppa/mkcramfs_2.4.17-1woody1_hppa.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-arm/mkcramfs_2.4.17-1woody1_arm.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-alpha/mkcramfs_2.4.17-1woody1_alpha.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody1_all.deb stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody1_all.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.dsc stable/main/binary-i386/mkcramfs_2.4.17-1woody1_i386.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.diff.gz kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody1_mips.deb stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1_all.deb stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody1_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.tar.gz stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody1_mips.deb stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody1_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.dsc kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody1) stable-security; urgency=high * fix ptrace security hole stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody1_powerpc.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.tar.gz stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody1_powerpc.deb stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody1_all.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.dsc kernel-patch-2.4.18-powerpc (2.4.18-1woody1) stable; urgency=high * Build against kernel-source-2.4.18 version 2.4.18-9 to pick up security fixes. * Backport change from unstable to disable CMD640 support - fixes some boot failures. stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.dsc stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1_all.deb stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.diff.gz kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1.1) stable-security; urgency=high * NMU * Added an s390 specific patch for the ptrace vulnerability, provided by Martin Schwidefsky . stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody2_mipsel.deb kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1 * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes: - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions * remove Readme.Debian from the diff stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1 * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes: - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions * remove Readme.Debian from the diff stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.dsc stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.tar.gz stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.2.2_s390.deb stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2_s390.deb kernel-image-2.4.17-s390 (2.4.17-2.woody.2.2) stable-security; urgency=high * NMU * revert accidental configuration changes stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.tar.gz stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody3_i386.deb stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.dsc kernel-image-2.2.20-i386 (2.2.20-5woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild with pcmcia-cs from stable-security so that katie ACCEPTs us stable/main/binary-sparc/kmtrace_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kbabel_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kbabel-dev_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kspy_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kdesdk_2.2.2-3.2_sparc.deb stable/main/binary-sparc/poxml_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kstartperf_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kexample_2.2.2-3.2_sparc.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/kbabel_2.2.2-3.2_s390.deb stable/main/binary-s390/kdesdk_2.2.2-3.2_s390.deb stable/main/binary-s390/kmtrace_2.2.2-3.2_s390.deb stable/main/binary-s390/kspy_2.2.2-3.2_s390.deb stable/main/binary-s390/kstartperf_2.2.2-3.2_s390.deb stable/main/binary-s390/kexample_2.2.2-3.2_s390.deb stable/main/binary-s390/poxml_2.2.2-3.2_s390.deb stable/main/binary-s390/kbabel-dev_2.2.2-3.2_s390.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/kbabel-dev_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kdesdk_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kstartperf_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kspy_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kbabel_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/poxml_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kmtrace_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kexample_2.2.2-3.2_powerpc.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/kexample_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kmtrace_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kbabel-dev_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kstartperf_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kbabel_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kspy_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/poxml_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kdesdk_2.2.2-3.2_mipsel.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/poxml_2.2.2-3.2_mips.deb stable/main/binary-mips/kbabel-dev_2.2.2-3.2_mips.deb stable/main/binary-mips/kmtrace_2.2.2-3.2_mips.deb stable/main/binary-mips/kspy_2.2.2-3.2_mips.deb stable/main/binary-mips/kbabel_2.2.2-3.2_mips.deb stable/main/binary-mips/kexample_2.2.2-3.2_mips.deb stable/main/binary-mips/kdesdk_2.2.2-3.2_mips.deb stable/main/binary-mips/kstartperf_2.2.2-3.2_mips.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/kbabel-dev_2.2.2-3.2_m68k.deb stable/main/binary-m68k/poxml_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kmtrace_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kexample_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kbabel_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kstartperf_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kspy_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kdesdk_2.2.2-3.2_m68k.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kdesdk_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kspy_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kmtrace_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kexample_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kbabel_2.2.2-3.2_ia64.deb stable/main/binary-ia64/poxml_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kbabel-dev_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kstartperf_2.2.2-3.2_ia64.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kstartperf_2.2.2-3.2_i386.deb stable/main/binary-i386/kspy_2.2.2-3.2_i386.deb stable/main/binary-i386/kbabel_2.2.2-3.2_i386.deb stable/main/binary-i386/kdesdk_2.2.2-3.2_i386.deb stable/main/binary-i386/kexample_2.2.2-3.2_i386.deb stable/main/binary-i386/kmtrace_2.2.2-3.2_i386.deb stable/main/binary-i386/kbabel-dev_2.2.2-3.2_i386.deb stable/main/binary-i386/poxml_2.2.2-3.2_i386.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kstartperf_2.2.2-3.2_arm.deb stable/main/binary-arm/kspy_2.2.2-3.2_arm.deb stable/main/binary-arm/kmtrace_2.2.2-3.2_arm.deb stable/main/binary-arm/kdesdk_2.2.2-3.2_arm.deb stable/main/binary-arm/poxml_2.2.2-3.2_arm.deb stable/main/binary-arm/kbabel-dev_2.2.2-3.2_arm.deb stable/main/binary-arm/kbabel_2.2.2-3.2_arm.deb stable/main/binary-arm/kexample_2.2.2-3.2_arm.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/poxml_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kbabel_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kmtrace_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kstartperf_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kexample_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kdesdk_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kbabel-dev_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kspy_2.2.2-3.2_alpha.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/poxml_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kexample_2.2.2-3.2_hppa.deb stable/main/binary-all/kdesdk-scripts_2.2.2-3.2_all.deb stable/main/binary-hppa/kdesdk_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kbabel_2.2.2-3.2_hppa.deb stable/main/source/kdesdk_2.2.2-3.2.dsc stable/main/binary-hppa/kstartperf_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kbabel-dev_2.2.2-3.2_hppa.deb stable/main/binary-all/kdepalettes_2.2.2-3.2_all.deb stable/main/binary-hppa/kmtrace_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kspy_2.2.2-3.2_hppa.deb stable/main/source/kdesdk_2.2.2-3.2.diff.gz stable/main/binary-all/kapptemplate_2.2.2-3.2_all.deb stable/main/binary-all/kdesdk-doc_2.2.2-3.2_all.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/kmail_2.2.2-14.6_sparc.deb stable/main/binary-sparc/klisa_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libmimelib-dev_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libkdenetwork1_2.2.2-14.6_sparc.deb stable/main/binary-sparc/korn_2.2.2-14.6_sparc.deb stable/main/binary-sparc/knewsticker_2.2.2-14.6_sparc.deb stable/main/binary-sparc/knode_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libmimelib1_2.2.2-14.6_sparc.deb stable/main/binary-sparc/ksirc_2.2.2-14.6_sparc.deb stable/main/binary-sparc/ktalkd_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kit_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kdict_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kppp_2.2.2-14.6_sparc.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-s390/kit_2.2.2-14.6_s390.deb stable/main/binary-s390/libmimelib-dev_2.2.2-14.6_s390.deb stable/main/binary-s390/klisa_2.2.2-14.6_s390.deb stable/main/binary-s390/kdict_2.2.2-14.6_s390.deb stable/main/binary-s390/ksirc_2.2.2-14.6_s390.deb stable/main/binary-s390/korn_2.2.2-14.6_s390.deb stable/main/binary-s390/kppp_2.2.2-14.6_s390.deb stable/main/binary-s390/knode_2.2.2-14.6_s390.deb stable/main/binary-s390/libmimelib1_2.2.2-14.6_s390.deb stable/main/binary-s390/libkdenetwork1_2.2.2-14.6_s390.deb stable/main/binary-s390/kmail_2.2.2-14.6_s390.deb stable/main/binary-s390/knewsticker_2.2.2-14.6_s390.deb stable/main/binary-s390/ktalkd_2.2.2-14.6_s390.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-powerpc/ksirc_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libmimelib1_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kdict_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/korn_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kmail_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/knode_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/ktalkd_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/klisa_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/knewsticker_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kit_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kppp_2.2.2-14.6_powerpc.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-mipsel/kdict_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/ksirc_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libmimelib1_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/klisa_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kppp_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/korn_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kit_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kmail_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/knewsticker_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/knode_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/ktalkd_2.2.2-14.6_mipsel.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-mips/korn_2.2.2-14.6_mips.deb stable/main/binary-mips/kppp_2.2.2-14.6_mips.deb stable/main/binary-mips/libkdenetwork1_2.2.2-14.6_mips.deb stable/main/binary-mips/kit_2.2.2-14.6_mips.deb stable/main/binary-mips/kdict_2.2.2-14.6_mips.deb stable/main/binary-mips/kmail_2.2.2-14.6_mips.deb stable/main/binary-mips/klisa_2.2.2-14.6_mips.deb stable/main/binary-mips/ktalkd_2.2.2-14.6_mips.deb stable/main/binary-mips/libmimelib1_2.2.2-14.6_mips.deb stable/main/binary-mips/libmimelib-dev_2.2.2-14.6_mips.deb stable/main/binary-mips/ksirc_2.2.2-14.6_mips.deb stable/main/binary-mips/knode_2.2.2-14.6_mips.deb stable/main/binary-mips/knewsticker_2.2.2-14.6_mips.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-m68k/libkdenetwork1_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kmail_2.2.2-14.6_m68k.deb stable/main/binary-m68k/libmimelib1_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kppp_2.2.2-14.6_m68k.deb stable/main/binary-m68k/korn_2.2.2-14.6_m68k.deb stable/main/binary-m68k/knewsticker_2.2.2-14.6_m68k.deb stable/main/binary-m68k/libmimelib-dev_2.2.2-14.6_m68k.deb stable/main/binary-m68k/ksirc_2.2.2-14.6_m68k.deb stable/main/binary-m68k/ktalkd_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kit_2.2.2-14.6_m68k.deb stable/main/binary-m68k/knode_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kdict_2.2.2-14.6_m68k.deb stable/main/binary-m68k/klisa_2.2.2-14.6_m68k.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-hppa/libmimelib-dev_2.2.2-14.6_hppa.deb stable/main/binary-hppa/libkdenetwork1_2.2.2-14.6_hppa.deb stable/main/binary-hppa/libmimelib1_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kmail_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kppp_2.2.2-14.6_hppa.deb stable/main/binary-hppa/knewsticker_2.2.2-14.6_hppa.deb stable/main/binary-hppa/korn_2.2.2-14.6_hppa.deb stable/main/binary-hppa/ktalkd_2.2.2-14.6_hppa.deb stable/main/binary-hppa/klisa_2.2.2-14.6_hppa.deb stable/main/binary-hppa/knode_2.2.2-14.6_hppa.deb stable/main/binary-hppa/ksirc_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kdict_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kit_2.2.2-14.6_hppa.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-arm/knewsticker_2.2.2-14.6_arm.deb stable/main/binary-arm/libmimelib-dev_2.2.2-14.6_arm.deb stable/main/binary-arm/kmail_2.2.2-14.6_arm.deb stable/main/binary-arm/kppp_2.2.2-14.6_arm.deb stable/main/binary-arm/kdict_2.2.2-14.6_arm.deb stable/main/binary-arm/libkdenetwork1_2.2.2-14.6_arm.deb stable/main/binary-arm/korn_2.2.2-14.6_arm.deb stable/main/binary-arm/klisa_2.2.2-14.6_arm.deb stable/main/binary-arm/ktalkd_2.2.2-14.6_arm.deb stable/main/binary-arm/ksirc_2.2.2-14.6_arm.deb stable/main/binary-arm/knode_2.2.2-14.6_arm.deb stable/main/binary-arm/kit_2.2.2-14.6_arm.deb stable/main/binary-arm/libmimelib1_2.2.2-14.6_arm.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-alpha/knode_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kit_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kppp_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kdict_2.2.2-14.6_alpha.deb stable/main/binary-alpha/klisa_2.2.2-14.6_alpha.deb stable/main/binary-alpha/ksirc_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libmimelib1_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libkdenetwork1_2.2.2-14.6_alpha.deb stable/main/binary-alpha/knewsticker_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libmimelib-dev_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kmail_2.2.2-14.6_alpha.deb stable/main/binary-alpha/ktalkd_2.2.2-14.6_alpha.deb stable/main/binary-alpha/korn_2.2.2-14.6_alpha.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-ia64/libkdenetwork1_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kit_2.2.2-14.6_ia64.deb stable/main/binary-ia64/libmimelib1_2.2.2-14.6_ia64.deb stable/main/binary-ia64/klisa_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kmail_2.2.2-14.6_ia64.deb stable/main/binary-ia64/ktalkd_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kppp_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kdict_2.2.2-14.6_ia64.deb stable/main/source/kdenetwork_2.2.2-14.6.diff.gz stable/main/binary-ia64/libmimelib-dev_2.2.2-14.6_ia64.deb stable/main/binary-ia64/ksirc_2.2.2-14.6_ia64.deb stable/main/binary-ia64/knewsticker_2.2.2-14.6_ia64.deb stable/main/binary-ia64/knode_2.2.2-14.6_ia64.deb stable/main/source/kdenetwork_2.2.2-14.6.dsc stable/main/binary-ia64/korn_2.2.2-14.6_ia64.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.8_sparc.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.8_s390.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libkmid_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.8_powerpc.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.8_mipsel.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.8_mips.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libkmid_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.8_m68k.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-ia64/libkmid_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.8_ia64.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.8_hppa.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-arm/libarts_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.8_arm.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.8_alpha.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.8_i386.deb stable/main/source/kdelibs_2.2.2-13.woody.8.dsc stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.8_all.deb stable/main/source/kdelibs_2.2.2-13.woody.8.diff.gz stable/main/binary-i386/libkmid_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libarts_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.8_i386.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-sparc/kcoloredit_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kpaint_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kooka_2.2.2-6.11_sparc.deb stable/main/binary-sparc/libkscan-dev_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kfract_2.2.2-6.11_sparc.deb stable/main/binary-sparc/ksnapshot_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kamera_2.2.2-6.11_sparc.deb stable/main/binary-sparc/libkscan1_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kghostview_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kiconedit_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kview_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kruler_2.2.2-6.11_sparc.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-s390/kiconedit_2.2.2-6.11_s390.deb stable/main/binary-s390/ksnapshot_2.2.2-6.11_s390.deb stable/main/binary-s390/libkscan1_2.2.2-6.11_s390.deb stable/main/binary-s390/kview_2.2.2-6.11_s390.deb stable/main/binary-s390/kcoloredit_2.2.2-6.11_s390.deb stable/main/binary-s390/kamera_2.2.2-6.11_s390.deb stable/main/binary-s390/kfract_2.2.2-6.11_s390.deb stable/main/binary-s390/libkscan-dev_2.2.2-6.11_s390.deb stable/main/binary-s390/kruler_2.2.2-6.11_s390.deb stable/main/binary-s390/kooka_2.2.2-6.11_s390.deb stable/main/binary-s390/kpaint_2.2.2-6.11_s390.deb stable/main/binary-s390/kghostview_2.2.2-6.11_s390.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-powerpc/kamera_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/ksnapshot_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kview_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/libkscan1_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kfract_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kooka_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kpaint_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kghostview_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kiconedit_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kruler_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kcoloredit_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/libkscan-dev_2.2.2-6.11_powerpc.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-mipsel/kghostview_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kiconedit_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/ksnapshot_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kamera_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/libkscan1_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kfract_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kcoloredit_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kruler_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kooka_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/libkscan-dev_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kview_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kpaint_2.2.2-6.11_mipsel.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-mips/kiconedit_2.2.2-6.11_mips.deb stable/main/binary-mips/kfract_2.2.2-6.11_mips.deb stable/main/binary-mips/kooka_2.2.2-6.11_mips.deb stable/main/binary-mips/kghostview_2.2.2-6.11_mips.deb stable/main/binary-mips/kpaint_2.2.2-6.11_mips.deb stable/main/binary-mips/libkscan-dev_2.2.2-6.11_mips.deb stable/main/binary-mips/kview_2.2.2-6.11_mips.deb stable/main/binary-mips/kruler_2.2.2-6.11_mips.deb stable/main/binary-mips/ksnapshot_2.2.2-6.11_mips.deb stable/main/binary-mips/kcoloredit_2.2.2-6.11_mips.deb stable/main/binary-mips/kamera_2.2.2-6.11_mips.deb stable/main/binary-mips/libkscan1_2.2.2-6.11_mips.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-m68k/kpaint_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kcoloredit_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kghostview_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kooka_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kfract_2.2.2-6.11_m68k.deb stable/main/binary-m68k/libkscan-dev_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kamera_2.2.2-6.11_m68k.deb stable/main/binary-m68k/ksnapshot_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kruler_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kiconedit_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kview_2.2.2-6.11_m68k.deb stable/main/binary-m68k/libkscan1_2.2.2-6.11_m68k.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-ia64/kghostview_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kruler_2.2.2-6.11_ia64.deb stable/main/binary-ia64/libkscan-dev_2.2.2-6.11_ia64.deb stable/main/binary-ia64/ksnapshot_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kooka_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kpaint_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kview_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kfract_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kiconedit_2.2.2-6.11_ia64.deb stable/main/binary-ia64/libkscan1_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kamera_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kcoloredit_2.2.2-6.11_ia64.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-i386/libkscan1_2.2.2-6.11_i386.deb stable/main/binary-i386/kpaint_2.2.2-6.11_i386.deb stable/main/binary-i386/kiconedit_2.2.2-6.11_i386.deb stable/main/binary-i386/kooka_2.2.2-6.11_i386.deb stable/main/binary-i386/kruler_2.2.2-6.11_i386.deb stable/main/binary-i386/libkscan-dev_2.2.2-6.11_i386.deb stable/main/binary-i386/ksnapshot_2.2.2-6.11_i386.deb stable/main/binary-i386/kfract_2.2.2-6.11_i386.deb stable/main/binary-i386/kamera_2.2.2-6.11_i386.deb stable/main/binary-i386/kghostview_2.2.2-6.11_i386.deb stable/main/binary-i386/kcoloredit_2.2.2-6.11_i386.deb stable/main/binary-i386/kview_2.2.2-6.11_i386.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-hppa/kview_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kcoloredit_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kfract_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kruler_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kghostview_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kamera_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kiconedit_2.2.2-6.11_hppa.deb stable/main/binary-hppa/ksnapshot_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kpaint_2.2.2-6.11_hppa.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-alpha/kiconedit_2.2.2-6.11_alpha.deb stable/main/source/kdegraphics_2.2.2-6.11.diff.gz stable/main/binary-alpha/libkscan1_2.2.2-6.11_alpha.deb stable/main/source/kdegraphics_2.2.2-6.11.dsc stable/main/binary-alpha/kcoloredit_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kview_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kamera_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kfract_2.2.2-6.11_alpha.deb stable/main/binary-alpha/libkscan-dev_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kruler_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kghostview_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kooka_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kpaint_2.2.2-6.11_alpha.deb stable/main/binary-alpha/ksnapshot_2.2.2-6.11_alpha.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-sparc/konsole_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libkonq3_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kscreensaver_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kate_2.2.2-14.7_sparc.deb stable/main/binary-sparc/konqueror_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-dev_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libkonq-dev_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdm_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-libs_2.2.2-14.7_sparc.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-s390/kdebase-dev_2.2.2-14.7_s390.deb stable/main/binary-s390/kate_2.2.2-14.7_s390.deb stable/main/binary-s390/kscreensaver_2.2.2-14.7_s390.deb stable/main/binary-s390/konqueror_2.2.2-14.7_s390.deb stable/main/binary-s390/kdm_2.2.2-14.7_s390.deb stable/main/binary-s390/libkonq-dev_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase_2.2.2-14.7_s390.deb stable/main/binary-s390/libkonq3_2.2.2-14.7_s390.deb stable/main/binary-s390/konsole_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase-libs_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.7_s390.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-powerpc/kdebase-libs_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdm_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kate_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kscreensaver_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/konsole_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libkonq-dev_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/konqueror_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase-dev_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libkonq3_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.7_powerpc.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-mipsel/kdebase-libs_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdm_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kscreensaver_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kate_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libkonq3_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase-dev_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/konsole_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libkonq-dev_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/konqueror_2.2.2-14.7_mipsel.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-mips/konsole_2.2.2-14.7_mips.deb stable/main/binary-mips/libkonq-dev_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-libs_2.2.2-14.7_mips.deb stable/main/binary-mips/kdm_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase_2.2.2-14.7_mips.deb stable/main/binary-mips/kate_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-dev_2.2.2-14.7_mips.deb stable/main/binary-mips/konqueror_2.2.2-14.7_mips.deb stable/main/binary-mips/kscreensaver_2.2.2-14.7_mips.deb stable/main/binary-mips/libkonq3_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.7_mips.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-m68k/konqueror_2.2.2-14.7_m68k.deb stable/main/binary-m68k/konsole_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-libs_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdm_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libkonq3_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kscreensaver_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libkonq-dev_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-dev_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kate_2.2.2-14.7_m68k.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-ia64/kate_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-dev_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdm_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kscreensaver_2.2.2-14.7_ia64.deb stable/main/binary-ia64/konsole_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libkonq3_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libkonq-dev_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-libs_2.2.2-14.7_ia64.deb stable/main/binary-ia64/konqueror_2.2.2-14.7_ia64.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-hppa/konqueror_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.7_hppa.deb stable/main/binary-hppa/konsole_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdm_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libkonq3_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kscreensaver_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kate_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-libs_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-dev_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libkonq-dev_2.2.2-14.7_hppa.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-arm/kscreensaver_2.2.2-14.7_arm.deb stable/main/binary-arm/kdm_2.2.2-14.7_arm.deb stable/main/binary-arm/libkonq-dev_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase_2.2.2-14.7_arm.deb stable/main/binary-arm/konsole_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.7_arm.deb stable/main/binary-arm/libkonq3_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-libs_2.2.2-14.7_arm.deb stable/main/binary-arm/konqueror_2.2.2-14.7_arm.deb stable/main/binary-arm/kate_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-dev_2.2.2-14.7_arm.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-alpha/kdebase-dev_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kate_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libkonq-dev_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libkonq3_2.2.2-14.7_alpha.deb stable/main/binary-alpha/konsole_2.2.2-14.7_alpha.deb stable/main/binary-alpha/konqueror_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kscreensaver_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase-libs_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdm_2.2.2-14.7_alpha.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/source/kdebase_2.2.2-14.7.dsc stable/main/binary-i386/konqueror_2.2.2-14.7_i386.deb stable/main/binary-i386/kscreensaver_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-libs_2.2.2-14.7_i386.deb stable/main/binary-i386/libkonq-dev_2.2.2-14.7_i386.deb stable/main/binary-i386/konsole_2.2.2-14.7_i386.deb stable/main/source/kdebase_2.2.2-14.7.diff.gz stable/main/binary-i386/kdebase_2.2.2-14.7_i386.deb stable/main/binary-i386/kdm_2.2.2-14.7_i386.deb stable/main/binary-all/kdebase-doc_2.2.2-14.7_all.deb stable/main/binary-i386/kate_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-dev_2.2.2-14.7_i386.deb stable/main/binary-i386/libkonq3_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.7_i386.deb stable/main/binary-all/kdewallpapers_2.2.2-14.7_all.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-sparc/jnethack_1.1.5-11woody2_sparc.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-s390/jnethack_1.1.5-11woody2_s390.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-powerpc/jnethack_1.1.5-11woody2_powerpc.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-mipsel/jnethack_1.1.5-11woody2_mipsel.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-mips/jnethack_1.1.5-11woody2_mips.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-m68k/jnethack_1.1.5-11woody2_m68k.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-ia64/jnethack_1.1.5-11woody2_ia64.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-hppa/jnethack_1.1.5-11woody2_hppa.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-arm/jnethack_1.1.5-11woody2_arm.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-alpha/jnethack_1.1.5-11woody2_alpha.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-i386/jnethack_1.1.5-11woody2_i386.deb stable/main/source/jnethack_1.1.5-11woody2.dsc stable/main/source/jnethack_1.1.5-11woody2.diff.gz jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-sparc/jigdo-file_0.6.5-2_sparc.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-s390/jigdo-file_0.6.5-2_s390.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-powerpc/jigdo-file_0.6.5-2_powerpc.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-mipsel/jigdo-file_0.6.5-2_mipsel.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-mips/jigdo-file_0.6.5-2_mips.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-m68k/jigdo-file_0.6.5-2_m68k.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-ia64/jigdo-file_0.6.5-2_ia64.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-hppa/jigdo-file_0.6.5-2_hppa.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-arm/jigdo-file_0.6.5-2_arm.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-alpha/jigdo-file_0.6.5-2_alpha.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/source/jigdo_0.6.5-2.dsc stable/main/source/jigdo_0.6.5-2.diff.gz stable/main/binary-i386/jigdo-file_0.6.5-2_i386.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-s390/bitchx-gtk_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx-ssl_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx-dev_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx_1.0-0c19-1.1_s390.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-powerpc/bitchx-gtk_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx-ssl_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx-dev_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx_1.0-0c19-1.1_powerpc.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-mipsel/bitchx-dev_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx-gtk_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx-ssl_1.0-0c19-1.1_mipsel.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-mips/bitchx-gtk_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx-dev_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx-ssl_1.0-0c19-1.1_mips.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-m68k/bitchx_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-gtk_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-ssl_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-dev_1.0-0c19-1.1_m68k.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-ia64/bitchx_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-ssl_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-dev_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-gtk_1.0-0c19-1.1_ia64.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-i386/bitchx-ssl_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx-dev_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx-gtk_1.0-0c19-1.1_i386.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-hppa/bitchx-gtk_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx-dev_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx-ssl_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx_1.0-0c19-1.1_hppa.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-arm/bitchx_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-ssl_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-dev_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-gtk_1.0-0c19-1.1_arm.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-alpha/bitchx-ssl_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx-gtk_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx-dev_1.0-0c19-1.1_alpha.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-sparc/bitchx-ssl_1.0-0c19-1.1_sparc.deb stable/main/source/ircii-pana_1.0-0c19-1.1.diff.gz stable/main/binary-sparc/bitchx-gtk_1.0-0c19-1.1_sparc.deb stable/main/binary-sparc/bitchx-dev_1.0-0c19-1.1_sparc.deb stable/main/source/ircii-pana_1.0-0c19-1.1.dsc stable/main/binary-sparc/bitchx_1.0-0c19-1.1_sparc.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-all/ipmasq_3.5.10c_all.deb stable/main/source/ipmasq_3.5.10c.dsc stable/main/source/ipmasq_3.5.10c.tar.gz ipmasq (3.5.10c) stable-security; urgency=high * Non-maintainer upload by the Security Team * Note that the issue fixed in 3.5.10b is CAN-2003-0785 stable/main/binary-all/xfonts-intl-european_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-chinese_1.2.1-0.woody.1_all.deb stable/main/source/intlfonts_1.2.1-0.woody.1.diff.gz stable/main/binary-all/xfonts-intl-asian_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-phonetic_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-japanese_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-arabic_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-chinese-big_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-japanese-big_1.2.1-0.woody.1_all.deb stable/main/source/intlfonts_1.2.1-0.woody.1.dsc intlfonts (1.2.1-0.woody.1) stable; urgency=high * New upstream release, backported to woody. It fixes the licensing problem with Japanese big fonts that we are not allowed to distribute. stable/main/source/imp_2.2.6-5.2.dsc stable/main/source/imp_2.2.6-5.2.diff.gz stable/main/binary-all/imp_2.2.6-5.2_all.deb imp (3:2.2.6-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Small correction for db.pgsql stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/imagemagick_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/perlmagick_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick5_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody1_sparc.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick++5_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick5_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/perlmagick_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/imagemagick_5.4.4.5-1woody1_s390.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody1_powerpc.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody1_mipsel.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick5_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/perlmagick_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/imagemagick_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick++5_5.4.4.5-1woody1_mips.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-m68k/imagemagick_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick5_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/perlmagick_5.4.4.5-1woody1_m68k.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/imagemagick_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/perlmagick_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick5_5.4.4.5-1woody1_ia64.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-hppa/perlmagick_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick5_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/imagemagick_5.4.4.5-1woody1_hppa.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick5_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/perlmagick_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick++5_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/imagemagick_5.4.4.5-1woody1_arm.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/perlmagick_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/imagemagick_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick5_5.4.4.5-1woody1_alpha.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/source/imagemagick_5.4.4.5-1woody1.diff.gz stable/main/binary-i386/perlmagick_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick++5_5.4.4.5-1woody1_i386.deb stable/main/source/imagemagick_5.4.4.5-1woody1.dsc stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick5_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/imagemagick_5.4.4.5-1woody1_i386.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-ia64/illuminator-demo_0.3.2-1.woody.2_ia64.deb stable/main/binary-ia64/illuminator0_0.3.2-1.woody.2_ia64.deb stable/main/binary-ia64/illuminator-dev_0.3.2-1.woody.2_ia64.deb illuminator (0.3.2-1.woody.2) testing; urgency=low * D'OH! Forgot to set the distribution to "testing" before upload... stable/main/binary-s390/hypermail_2.1.3-2.0_s390.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-powerpc/hypermail_2.1.3-2.0_powerpc.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-mipsel/hypermail_2.1.3-2.0_mipsel.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-mips/hypermail_2.1.3-2.0_mips.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-m68k/hypermail_2.1.3-2.0_m68k.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-ia64/hypermail_2.1.3-2.0_ia64.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-i386/hypermail_2.1.3-2.0_i386.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-hppa/hypermail_2.1.3-2.0_hppa.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-arm/hypermail_2.1.3-2.0_arm.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-alpha/hypermail_2.1.3-2.0_alpha.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-sparc/hypermail_2.1.3-2.0_sparc.deb stable/main/source/hypermail_2.1.3-2.0.dsc stable/main/source/hypermail_2.1.3-2.0.diff.gz hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-sparc/hylafax-client_4.1.1-3_sparc.deb stable/main/binary-sparc/hylafax-server_4.1.1-3_sparc.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-s390/hylafax-server_4.1.1-3_s390.deb stable/main/binary-s390/hylafax-client_4.1.1-3_s390.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-m68k/hylafax-client_4.1.1-3_m68k.deb stable/main/binary-m68k/hylafax-server_4.1.1-3_m68k.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-ia64/hylafax-server_4.1.1-3_ia64.deb stable/main/binary-ia64/hylafax-client_4.1.1-3_ia64.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-i386/hylafax-client_4.1.1-3_i386.deb stable/main/binary-i386/hylafax-server_4.1.1-3_i386.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-hppa/hylafax-server_4.1.1-3_hppa.deb stable/main/binary-hppa/hylafax-client_4.1.1-3_hppa.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-arm/hylafax-server_4.1.1-3_arm.deb stable/main/binary-arm/hylafax-client_4.1.1-3_arm.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-alpha/hylafax-server_4.1.1-3_alpha.deb stable/main/binary-alpha/hylafax-client_4.1.1-3_alpha.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/source/hylafax_4.1.1-3.dsc stable/main/binary-powerpc/hylafax-server_4.1.1-3_powerpc.deb stable/main/binary-all/hylafax-doc_4.1.1-3_all.deb stable/main/binary-powerpc/hylafax-client_4.1.1-3_powerpc.deb stable/main/source/hylafax_4.1.1-3.diff.gz hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-sparc/gzip_1.3.2-3woody1_sparc.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-s390/gzip_1.3.2-3woody1_s390.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-powerpc/gzip_1.3.2-3woody1_powerpc.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-mipsel/gzip_1.3.2-3woody1_mipsel.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-mips/gzip_1.3.2-3woody1_mips.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-m68k/gzip_1.3.2-3woody1_m68k.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-ia64/gzip_1.3.2-3woody1_ia64.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-hppa/gzip_1.3.2-3woody1_hppa.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-arm/gzip_1.3.2-3woody1_arm.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-alpha/gzip_1.3.2-3woody1_alpha.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/source/gzip_1.3.2-3woody1.dsc stable/main/source/gzip_1.3.2-3woody1.diff.gz stable/main/binary-i386/gzip_1.3.2-3woody1_i386.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/source/gs-common_0.3.3.0woody1.tar.gz stable/main/binary-all/gs-common_0.3.3.0woody1_all.deb stable/main/source/gs-common_0.3.3.0woody1.dsc gs-common (0.3.3.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch ps2epsi to create a temporary file securely using tempfile stable/main/binary-sparc/gopher_3.0.3woody1_sparc.deb stable/main/binary-sparc/gopherd_3.0.3woody1_sparc.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-s390/gopher_3.0.3woody1_s390.deb stable/main/binary-s390/gopherd_3.0.3woody1_s390.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-powerpc/gopher_3.0.3woody1_powerpc.deb stable/main/binary-powerpc/gopherd_3.0.3woody1_powerpc.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-mipsel/gopherd_3.0.3woody1_mipsel.deb stable/main/binary-mipsel/gopher_3.0.3woody1_mipsel.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-mips/gopher_3.0.3woody1_mips.deb stable/main/binary-mips/gopherd_3.0.3woody1_mips.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-m68k/gopherd_3.0.3woody1_m68k.deb stable/main/binary-m68k/gopher_3.0.3woody1_m68k.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-ia64/gopherd_3.0.3woody1_ia64.deb stable/main/binary-ia64/gopher_3.0.3woody1_ia64.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-hppa/gopher_3.0.3woody1_hppa.deb stable/main/binary-hppa/gopherd_3.0.3woody1_hppa.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-arm/gopherd_3.0.3woody1_arm.deb stable/main/binary-arm/gopher_3.0.3woody1_arm.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-alpha/gopherd_3.0.3woody1_alpha.deb stable/main/binary-alpha/gopher_3.0.3woody1_alpha.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/source/gopher_3.0.3woody1.dsc stable/main/source/gopher_3.0.3woody1.tar.gz stable/main/binary-i386/gopherd_3.0.3woody1_i386.deb stable/main/binary-i386/gopher_3.0.3woody1_i386.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-sparc/gnupg_1.0.6-4_sparc.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-s390/gnupg_1.0.6-4_s390.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-powerpc/gnupg_1.0.6-4_powerpc.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-mipsel/gnupg_1.0.6-4_mipsel.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-mips/gnupg_1.0.6-4_mips.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-m68k/gnupg_1.0.6-4_m68k.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-ia64/gnupg_1.0.6-4_ia64.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-hppa/gnupg_1.0.6-4_hppa.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-arm/gnupg_1.0.6-4_arm.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-alpha/gnupg_1.0.6-4_alpha.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/source/gnupg_1.0.6-4.dsc stable/main/binary-i386/gnupg_1.0.6-4_i386.deb stable/main/source/gnupg_1.0.6-4.diff.gz gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-sparc/gnocatan-server_0.6.1-5woody2_sparc.deb stable/main/binary-sparc/gnocatan-client_0.6.1-5woody2_sparc.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-s390/gnocatan-server_0.6.1-5woody2_s390.deb stable/main/binary-s390/gnocatan-client_0.6.1-5woody2_s390.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-powerpc/gnocatan-server_0.6.1-5woody2_powerpc.deb stable/main/binary-powerpc/gnocatan-client_0.6.1-5woody2_powerpc.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-mipsel/gnocatan-client_0.6.1-5woody2_mipsel.deb stable/main/binary-mipsel/gnocatan-server_0.6.1-5woody2_mipsel.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-mips/gnocatan-server_0.6.1-5woody2_mips.deb stable/main/binary-mips/gnocatan-client_0.6.1-5woody2_mips.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-m68k/gnocatan-server_0.6.1-5woody2_m68k.deb stable/main/binary-m68k/gnocatan-client_0.6.1-5woody2_m68k.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-ia64/gnocatan-client_0.6.1-5woody2_ia64.deb stable/main/binary-ia64/gnocatan-server_0.6.1-5woody2_ia64.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-arm/gnocatan-server_0.6.1-5woody2_arm.deb stable/main/binary-arm/gnocatan-client_0.6.1-5woody2_arm.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-alpha/gnocatan-server_0.6.1-5woody2_alpha.deb stable/main/binary-alpha/gnocatan-client_0.6.1-5woody2_alpha.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-i386/gnocatan-client_0.6.1-5woody2_i386.deb stable/main/source/gnocatan_0.6.1-5woody2.dsc stable/main/binary-all/gnocatan-help_0.6.1-5woody2_all.deb stable/main/binary-all/gnocatan-data_0.6.1-5woody2_all.deb stable/main/source/gnocatan_0.6.1-5woody2.diff.gz stable/main/binary-i386/gnocatan-server_0.6.1-5woody2_i386.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-sparc/libc6-sparc64_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-prof_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dev_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-pic_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dbg_2.2.5-11.5_sparc.deb stable/main/binary-sparc/nscd_2.2.5-11.5_sparc.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-s390/libc6-pic_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-dbg_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-prof_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6_2.2.5-11.5_s390.deb stable/main/binary-s390/nscd_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-dev_2.2.5-11.5_s390.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-powerpc/libc6-dev_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/nscd_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.2.5-11.5_powerpc.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-mipsel/nscd_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.2.5-11.5_mipsel.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-mips/nscd_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-dev_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-pic_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-prof_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-dbg_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6_2.2.5-11.5_mips.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-ia64/libc6.1-pic_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1_2.2.5-11.5_ia64.deb stable/main/binary-ia64/nscd_2.2.5-11.5_ia64.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-i386/libc6-dbg_2.2.5-11.5_i386.deb stable/main/binary-i386/nscd_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-pic_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-dev_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-prof_2.2.5-11.5_i386.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-hppa/libc6-prof_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-dbg_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-pic_2.2.5-11.5_hppa.deb stable/main/binary-hppa/nscd_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-dev_2.2.5-11.5_hppa.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-arm/libc6-prof_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-dev_2.2.5-11.5_arm.deb stable/main/binary-arm/nscd_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-dbg_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-pic_2.2.5-11.5_arm.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.2.5-11.5_alpha.deb stable/main/binary-alpha/nscd_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.2.5-11.5_alpha.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-m68k/libc6-dev_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-prof_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-pic_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-dbg_2.2.5-11.5_m68k.deb stable/main/binary-m68k/nscd_2.2.5-11.5_m68k.deb stable/main/binary-all/locales_2.2.5-11.5_all.deb stable/main/source/glibc_2.2.5-11.5.dsc stable/main/source/glibc_2.2.5-11.5.diff.gz stable/main/binary-all/glibc-doc_2.2.5-11.5_all.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/source/gallery_1.2.5-8woody1.dsc stable/main/source/gallery_1.2.5-8woody1.diff.gz stable/main/binary-all/gallery_1.2.5-8woody1_all.deb gallery (1.2.5-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cross-site scripting in searchstring parameter (CAN-2003-0614) [search.php] stable/main/binary-sparc/fuzz_0.6-6woody1_sparc.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-s390/fuzz_0.6-6woody1_s390.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-powerpc/fuzz_0.6-6woody1_powerpc.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-mipsel/fuzz_0.6-6woody1_mipsel.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-mips/fuzz_0.6-6woody1_mips.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-m68k/fuzz_0.6-6woody1_m68k.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-ia64/fuzz_0.6-6woody1_ia64.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-hppa/fuzz_0.6-6woody1_hppa.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-arm/fuzz_0.6-6woody1_arm.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-alpha/fuzz_0.6-6woody1_alpha.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/source/fuzz_0.6-6woody1.diff.gz stable/main/source/fuzz_0.6-6woody1.dsc stable/main/binary-i386/fuzz_0.6-6woody1_i386.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-alpha/ftape-util_1.09.2001.08.13-0.3_alpha.deb ftape-tools (1:1.09.2001.08.13-0.3) unstable; urgency=low * Non-maintainer upload. * debian/control: Added `texinfo' to build dependencies. Closes: Bug#133562. stable/main/binary-sparc/file_3.37-3.1.woody.1_sparc.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-s390/file_3.37-3.1.woody.1_s390.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-powerpc/file_3.37-3.1.woody.1_powerpc.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-mipsel/file_3.37-3.1.woody.1_mipsel.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-mips/file_3.37-3.1.woody.1_mips.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-m68k/file_3.37-3.1.woody.1_m68k.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-ia64/file_3.37-3.1.woody.1_ia64.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-i386/file_3.37-3.1.woody.1_i386.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-hppa/file_3.37-3.1.woody.1_hppa.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-arm/file_3.37-3.1.woody.1_arm.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-alpha/file_3.37-3.1.woody.1_alpha.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/source/file_3.37-3.1.woody.1.dsc stable/main/source/file_3.37-3.1.woody.1.diff.gz file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-s390/fetchmail-ssl_5.9.11-6.2_s390.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.2_powerpc.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.2_mipsel.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mips/fetchmail-ssl_5.9.11-6.2_mips.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.2_m68k.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.2_ia64.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-i386/fetchmail-ssl_5.9.11-6.2_i386.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.2_hppa.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-arm/fetchmail-ssl_5.9.11-6.2_arm.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.2_alpha.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.2_sparc.deb stable/main/source/fetchmail-ssl_5.9.11-6.2.dsc stable/main/source/fetchmail-ssl_5.9.11-6.2.diff.gz fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-s390/fetchmail_5.9.11-6.2_s390.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-powerpc/fetchmail_5.9.11-6.2_powerpc.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mipsel/fetchmail_5.9.11-6.2_mipsel.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mips/fetchmail_5.9.11-6.2_mips.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-m68k/fetchmail_5.9.11-6.2_m68k.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-ia64/fetchmail_5.9.11-6.2_ia64.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-i386/fetchmail_5.9.11-6.2_i386.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-hppa/fetchmail_5.9.11-6.2_hppa.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-arm/fetchmail_5.9.11-6.2_arm.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-alpha/fetchmail_5.9.11-6.2_alpha.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/source/fetchmail_5.9.11-6.2.diff.gz stable/main/binary-all/fetchmailconf_5.9.11-6.2_all.deb stable/main/binary-sparc/fetchmail_5.9.11-6.2_sparc.deb stable/main/binary-all/fetchmail-common_5.9.11-6.2_all.deb stable/main/source/fetchmail_5.9.11-6.2.dsc fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-sparc/fdclone_2.00a-1woody3_sparc.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-s390/fdclone_2.00a-1woody3_s390.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-powerpc/fdclone_2.00a-1woody3_powerpc.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-m68k/fdclone_2.00a-1woody3_m68k.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-hppa/fdclone_2.00a-1woody3_hppa.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-arm/fdclone_2.00a-1woody3_arm.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-alpha/fdclone_2.00a-1woody3_alpha.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/source/fdclone_2.00a-1woody3.dsc stable/main/binary-i386/fdclone_2.00a-1woody3_i386.deb stable/main/source/fdclone_2.00a-1woody3.diff.gz fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-sparc/falconseye_1.9.3-7woody3_sparc.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-s390/falconseye_1.9.3-7woody3_s390.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-powerpc/falconseye_1.9.3-7woody3_powerpc.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-mipsel/falconseye_1.9.3-7woody3_mipsel.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-mips/falconseye_1.9.3-7woody3_mips.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-m68k/falconseye_1.9.3-7woody3_m68k.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-ia64/falconseye_1.9.3-7woody3_ia64.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-hppa/falconseye_1.9.3-7woody3_hppa.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-arm/falconseye_1.9.3-7woody3_arm.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-alpha/falconseye_1.9.3-7woody3_alpha.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/source/falconseye_1.9.3-7woody3.dsc stable/main/binary-i386/falconseye_1.9.3-7woody3_i386.deb stable/main/binary-all/falconseye-data_1.9.3-7woody3_all.deb stable/main/source/falconseye_1.9.3-7woody3.diff.gz falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-sparc/eximon_3.35-1woody2_sparc.deb stable/main/binary-sparc/exim_3.35-1woody2_sparc.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-s390/eximon_3.35-1woody2_s390.deb stable/main/binary-s390/exim_3.35-1woody2_s390.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-powerpc/eximon_3.35-1woody2_powerpc.deb stable/main/binary-powerpc/exim_3.35-1woody2_powerpc.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-mipsel/exim_3.35-1woody2_mipsel.deb stable/main/binary-mipsel/eximon_3.35-1woody2_mipsel.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-mips/eximon_3.35-1woody2_mips.deb stable/main/binary-mips/exim_3.35-1woody2_mips.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-m68k/exim_3.35-1woody2_m68k.deb stable/main/binary-m68k/eximon_3.35-1woody2_m68k.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-ia64/exim_3.35-1woody2_ia64.deb stable/main/binary-ia64/eximon_3.35-1woody2_ia64.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-hppa/eximon_3.35-1woody2_hppa.deb stable/main/binary-hppa/exim_3.35-1woody2_hppa.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-arm/exim_3.35-1woody2_arm.deb stable/main/binary-arm/eximon_3.35-1woody2_arm.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-alpha/exim_3.35-1woody2_alpha.deb stable/main/binary-alpha/eximon_3.35-1woody2_alpha.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/source/exim_3.35-1woody2.diff.gz stable/main/binary-i386/exim_3.35-1woody2_i386.deb stable/main/binary-i386/eximon_3.35-1woody2_i386.deb stable/main/source/exim_3.35-1woody2.dsc exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-sparc/ethereal-dev_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/ethereal_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/tethereal_0.9.4-1woody5_sparc.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-s390/tethereal_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal-common_0.9.4-1woody5_s390.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/ethereal_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody5_powerpc.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-mipsel/tethereal_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody5_mipsel.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-mips/ethereal-dev_0.9.4-1woody5_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody5_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody5_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody5_mips.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-m68k/ethereal_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/ethereal-dev_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody5_m68k.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-ia64/tethereal_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody5_ia64.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-hppa/ethereal-dev_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/ethereal-common_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody5_hppa.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-arm/ethereal-common_0.9.4-1woody5_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody5_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody5_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody5_arm.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-alpha/tethereal_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal-dev_0.9.4-1woody5_alpha.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-i386/ethereal-common_0.9.4-1woody5_i386.deb stable/main/source/ethereal_0.9.4-1woody5.diff.gz stable/main/binary-i386/ethereal_0.9.4-1woody5_i386.deb stable/main/source/ethereal_0.9.4-1woody5.dsc stable/main/binary-i386/tethereal_0.9.4-1woody5_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody5_i386.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.2_sparc.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-s390/eterm_0.9.2-0pre2002042903.2_s390.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.2_powerpc.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.2_mipsel.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-mips/eterm_0.9.2-0pre2002042903.2_mips.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.2_m68k.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.2_ia64.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.2_hppa.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-arm/eterm_0.9.2-0pre2002042903.2_arm.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.2_alpha.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/source/eterm_0.9.2-0pre2002042903.2.tar.gz stable/main/source/eterm_0.9.2-0pre2002042903.2.dsc stable/main/binary-i386/eterm_0.9.2-0pre2002042903.2_i386.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-all/eroaster_2.1.0.0.3-2woody1_all.deb stable/main/source/eroaster_2.1.0.0.3-2woody1.dsc stable/main/source/eroaster_2.1.0.0.3-2woody1.diff.gz eroaster (2.1.0.0.3-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to use a temporary file under $HOME, rather than in /tmp (CAN-2003-0656) stable/main/binary-sparc/epic4_1.1.2.20020219-2.2_sparc.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-s390/epic4_1.1.2.20020219-2.2_s390.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-powerpc/epic4_1.1.2.20020219-2.2_powerpc.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-mipsel/epic4_1.1.2.20020219-2.2_mipsel.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-mips/epic4_1.1.2.20020219-2.2_mips.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-m68k/epic4_1.1.2.20020219-2.2_m68k.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-ia64/epic4_1.1.2.20020219-2.2_ia64.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-i386/epic4_1.1.2.20020219-2.2_i386.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-hppa/epic4_1.1.2.20020219-2.2_hppa.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-arm/epic4_1.1.2.20020219-2.2_arm.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-alpha/epic4_1.1.2.20020219-2.2_alpha.deb stable/main/source/epic4_1.1.2.20020219-2.2.dsc stable/main/source/epic4_1.1.2.20020219-2.2.diff.gz epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-s390/epic_3.004-17.1_s390.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-powerpc/epic_3.004-17.1_powerpc.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-mipsel/epic_3.004-17.1_mipsel.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-mips/epic_3.004-17.1_mips.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-m68k/epic_3.004-17.1_m68k.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-ia64/epic_3.004-17.1_ia64.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-i386/epic_3.004-17.1_i386.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-hppa/epic_3.004-17.1_hppa.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-arm/epic_3.004-17.1_arm.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-alpha/epic_3.004-17.1_alpha.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-sparc/epic_3.004-17.1_sparc.deb stable/main/source/epic_3.004-17.1.dsc stable/main/source/epic_3.004-17.1.diff.gz epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/source/eldav_0.0.20020411-1woody1.diff.gz stable/main/binary-all/eldav_0.0.20020411-1woody1_all.deb stable/main/source/eldav_0.0.20020411-1woody1.dsc eldav (0.0.20020411-1woody1) stable-security; urgency=high * fix insecure tempfile handling (CAN-2003-0438) * backport make-temp-file from apel-10.5/poe.el stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_s390.deb stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.1_s390.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_powerpc.deb stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.1_powerpc.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.1_mipsel.deb stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mipsel.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.1_mips.deb stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mips.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_m68k.deb stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.1_m68k.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.1_ia64.deb stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_ia64.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_i386.deb stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.1_i386.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_hppa.deb stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.1_hppa.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_arm.deb stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.1_arm.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_alpha.deb stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.1_alpha.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.diff.gz stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.1_sparc.deb stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.dsc stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_sparc.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-arm/dwww_1.7.6.woody.1_arm.deb stable/main/binary-arm/realpath_1.7.6.woody.1_arm.deb dwww (1.7.6.woody.1) woody-proposed-updates; urgency=low * Upload to woody, no changes in source. The current dwww version in woody is 1.7.4, but I'd like to see 1.7.6 there: it has fixed a few of bugs and no new bug has been reported for 6 weeks. So it really is worth including in woody, I think. stable/main/binary-powerpc/dietlibc-dev_0.12-2.5_powerpc.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-mipsel/dietlibc-dev_0.12-2.5_mipsel.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-mips/dietlibc-dev_0.12-2.5_mips.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-i386/dietlibc-dev_0.12-2.5_i386.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-arm/dietlibc-dev_0.12-2.5_arm.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-alpha/dietlibc-dev_0.12-2.5_alpha.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/source/dietlibc_0.12-2.5.diff.gz stable/main/binary-sparc/dietlibc-dev_0.12-2.5_sparc.deb stable/main/binary-all/dietlibc-doc_0.12-2.5_all.deb stable/main/source/dietlibc_0.12-2.5.dsc dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-s390/dhcp3-dev_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-server_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-relay_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-common_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-client_3.0+3.0.1rc9-2.2_s390.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-powerpc/dhcp3-common_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-client_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-relay_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-server_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-dev_3.0+3.0.1rc9-2.2_powerpc.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-mipsel/dhcp3-dev_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-server_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-relay_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-common_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-client_3.0+3.0.1rc9-2.2_mipsel.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-mips/dhcp3-common_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-relay_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-server_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-dev_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-client_3.0+3.0.1rc9-2.2_mips.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-m68k/dhcp3-server_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-relay_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-common_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-client_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-dev_3.0+3.0.1rc9-2.2_m68k.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-ia64/dhcp3-dev_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-client_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-relay_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-common_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-server_3.0+3.0.1rc9-2.2_ia64.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-i386/dhcp3-client_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-dev_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-server_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-relay_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-common_3.0+3.0.1rc9-2.2_i386.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-hppa/dhcp3-dev_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-server_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-relay_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-common_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-client_3.0+3.0.1rc9-2.2_hppa.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-arm/dhcp3-server_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-dev_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-relay_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-client_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-common_3.0+3.0.1rc9-2.2_arm.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-alpha/dhcp3-server_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-relay_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-client_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-dev_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-common_3.0+3.0.1rc9-2.2_alpha.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-sparc/dhcp3-relay_3.0+3.0.1rc9-2.2_sparc.deb stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.dsc stable/main/binary-sparc/dhcp3-server_3.0+3.0.1rc9-2.2_sparc.deb stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.diff.gz stable/main/binary-sparc/dhcp3-common_3.0+3.0.1rc9-2.2_sparc.deb stable/main/binary-sparc/dhcp3-dev_3.0+3.0.1rc9-2.2_sparc.deb stable/main/binary-sparc/dhcp3-client_3.0+3.0.1rc9-2.2_sparc.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-sparc/debianutils_1.16.2woody1_sparc.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-s390/debianutils_1.16.2woody1_s390.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-powerpc/debianutils_1.16.2woody1_powerpc.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-mipsel/debianutils_1.16.2woody1_mipsel.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-mips/debianutils_1.16.2woody1_mips.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-m68k/debianutils_1.16.2woody1_m68k.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-ia64/debianutils_1.16.2woody1_ia64.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-i386/debianutils_1.16.2woody1_i386.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-hppa/debianutils_1.16.2woody1_hppa.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-arm/debianutils_1.16.2woody1_arm.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-alpha/debianutils_1.16.2woody1_alpha.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/source/debianutils_1.16.2woody1.tar.gz stable/main/source/debianutils_1.16.2woody1.dsc debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/source/ddskk_11.6.rel.0-2woody1.dsc stable/main/source/ddskk_11.6.rel.0-2woody1.diff.gz stable/main/binary-all/ddskk_11.6.rel.0-2woody1_all.deb ddskk (11.6.rel.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/dbishell_0.8.9-2woody1_all.deb stable/main/source/dbishell_0.8.9-2woody1.diff.gz stable/main/source/dbishell_0.8.9-2woody1.dsc dbishell (0.8.9-2woody1) stable; urgency=low * work around xterm feature disabled in DSA 380-1 that we used. Without this change, we lose the ability to run inside xterms after DSA 380-1 is dealt with on a system. stable/main/binary-s390/cyrus-common_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-pop3d_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-admin_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-imapd_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-nntp_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-dev_1.5.19-9.1_s390.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-powerpc/cyrus-dev_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-common_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-admin_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.1_powerpc.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-admin_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-dev_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-common_1.5.19-9.1_mipsel.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-mips/cyrus-pop3d_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-dev_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-admin_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-imapd_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-common_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-nntp_1.5.19-9.1_mips.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-m68k/cyrus-imapd_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-nntp_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-dev_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-admin_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-common_1.5.19-9.1_m68k.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-ia64/cyrus-common_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-admin_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-dev_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-imapd_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-nntp_1.5.19-9.1_ia64.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-i386/cyrus-nntp_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-common_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-dev_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-admin_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-pop3d_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-imapd_1.5.19-9.1_i386.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-common_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-imapd_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-admin_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-nntp_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-dev_1.5.19-9.1_hppa.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-arm/cyrus-nntp_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-common_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-dev_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-imapd_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-admin_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-pop3d_1.5.19-9.1_arm.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-alpha/cyrus-admin_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-imapd_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-common_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-dev_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-nntp_1.5.19-9.1_alpha.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-sparc/cyrus-nntp_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-admin_1.5.19-9.1_sparc.deb stable/main/source/cyrus-imapd_1.5.19-9.1.diff.gz stable/main/binary-sparc/cyrus-dev_1.5.19-9.1_sparc.deb stable/main/source/cyrus-imapd_1.5.19-9.1.dsc stable/main/binary-sparc/cyrus-common_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-imapd_1.5.19-9.1_sparc.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-s390/cvs_1.11.1p1debian-8.1_s390.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-powerpc/cvs_1.11.1p1debian-8.1_powerpc.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-mipsel/cvs_1.11.1p1debian-8.1_mipsel.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-mips/cvs_1.11.1p1debian-8.1_mips.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-m68k/cvs_1.11.1p1debian-8.1_m68k.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-ia64/cvs_1.11.1p1debian-8.1_ia64.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-i386/cvs_1.11.1p1debian-8.1_i386.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-hppa/cvs_1.11.1p1debian-8.1_hppa.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-arm/cvs_1.11.1p1debian-8.1_arm.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-alpha/cvs_1.11.1p1debian-8.1_alpha.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/source/cvs_1.11.1p1debian-8.1.diff.gz stable/main/binary-sparc/cvs_1.11.1p1debian-8.1_sparc.deb stable/main/source/cvs_1.11.1p1debian-8.1.dsc cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys-client_1.1.14-5_sparc.deb stable/main/binary-sparc/libcupsys2_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys_1.1.14-5_sparc.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-s390/cupsys-pstoraster_1.1.14-5_s390.deb stable/main/binary-s390/cupsys-client_1.1.14-5_s390.deb stable/main/binary-s390/cupsys-bsd_1.1.14-5_s390.deb stable/main/binary-s390/libcupsys2_1.1.14-5_s390.deb stable/main/binary-s390/libcupsys2-dev_1.1.14-5_s390.deb stable/main/binary-s390/cupsys_1.1.14-5_s390.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-powerpc/libcupsys2_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.1.14-5_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys_1.1.14-5_powerpc.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-mipsel/cupsys-bsd_1.1.14-5_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.1.14-5_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.1.14-5_mipsel.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-mips/cupsys-pstoraster_1.1.14-5_mips.deb stable/main/binary-mips/cupsys-bsd_1.1.14-5_mips.deb stable/main/binary-mips/cupsys-client_1.1.14-5_mips.deb stable/main/binary-mips/libcupsys2-dev_1.1.14-5_mips.deb stable/main/binary-mips/libcupsys2_1.1.14-5_mips.deb stable/main/binary-mips/cupsys_1.1.14-5_mips.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-m68k/cupsys-client_1.1.14-5_m68k.deb stable/main/binary-m68k/libcupsys2_1.1.14-5_m68k.deb stable/main/binary-m68k/libcupsys2-dev_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys-bsd_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys_1.1.14-5_m68k.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys-client_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.1.14-5_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.1.14-5_ia64.deb stable/main/binary-ia64/libcupsys2_1.1.14-5_ia64.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-hppa/libcupsys2_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-client_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.1.14-5_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.1.14-5_hppa.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-arm/libcupsys2_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-client_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-bsd_1.1.14-5_arm.deb stable/main/binary-arm/libcupsys2-dev_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-pstoraster_1.1.14-5_arm.deb stable/main/binary-arm/cupsys_1.1.14-5_arm.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-alpha/libcupsys2-dev_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-client_1.1.14-5_alpha.deb stable/main/binary-alpha/libcupsys2_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys_1.1.14-5_alpha.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/source/cupsys_1.1.14-5.diff.gz stable/main/binary-i386/cupsys-bsd_1.1.14-5_i386.deb stable/main/binary-i386/cupsys_1.1.14-5_i386.deb stable/main/binary-i386/libcupsys2-dev_1.1.14-5_i386.deb stable/main/binary-i386/cupsys-client_1.1.14-5_i386.deb stable/main/source/cupsys_1.1.14-5.dsc stable/main/binary-i386/cupsys-pstoraster_1.1.14-5_i386.deb stable/main/binary-i386/libcupsys2_1.1.14-5_i386.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/source/console-data_1999.08.29-24.2.diff.gz stable/main/binary-all/console-data_1999.08.29-24.2_all.deb stable/main/source/console-data_1999.08.29-24.2.dsc console-data (1999.08.29-24.2) stable; urgency=low * Fix depends to work properly on woody. Closes: #201659. * Change maintainer. stable/main/binary-sparc/colrconv_0.99.2-8_sparc.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-s390/colrconv_0.99.2-8_s390.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-powerpc/colrconv_0.99.2-8_powerpc.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-mipsel/colrconv_0.99.2-8_mipsel.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-mips/colrconv_0.99.2-8_mips.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-m68k/colrconv_0.99.2-8_m68k.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-ia64/colrconv_0.99.2-8_ia64.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-hppa/colrconv_0.99.2-8_hppa.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-arm/colrconv_0.99.2-8_arm.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-s390/canna-utils_3.5b2-46.2_s390.deb stable/main/binary-s390/canna_3.5b2-46.2_s390.deb stable/main/binary-s390/libcanna1g_3.5b2-46.2_s390.deb stable/main/binary-s390/libcanna1g-dev_3.5b2-46.2_s390.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-powerpc/canna_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/libcanna1g-dev_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/canna-utils_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/libcanna1g_3.5b2-46.2_powerpc.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-mipsel/libcanna1g-dev_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/canna_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/canna-utils_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/libcanna1g_3.5b2-46.2_mipsel.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-mips/libcanna1g_3.5b2-46.2_mips.deb stable/main/binary-mips/libcanna1g-dev_3.5b2-46.2_mips.deb stable/main/binary-mips/canna-utils_3.5b2-46.2_mips.deb stable/main/binary-mips/canna_3.5b2-46.2_mips.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-m68k/libcanna1g_3.5b2-46.2_m68k.deb stable/main/binary-m68k/libcanna1g-dev_3.5b2-46.2_m68k.deb stable/main/binary-m68k/canna_3.5b2-46.2_m68k.deb stable/main/binary-m68k/canna-utils_3.5b2-46.2_m68k.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-ia64/libcanna1g-dev_3.5b2-46.2_ia64.deb stable/main/binary-ia64/canna_3.5b2-46.2_ia64.deb stable/main/binary-ia64/canna-utils_3.5b2-46.2_ia64.deb stable/main/binary-ia64/libcanna1g_3.5b2-46.2_ia64.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-i386/canna_3.5b2-46.2_i386.deb stable/main/binary-i386/canna-utils_3.5b2-46.2_i386.deb stable/main/binary-i386/libcanna1g_3.5b2-46.2_i386.deb stable/main/binary-i386/libcanna1g-dev_3.5b2-46.2_i386.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-hppa/libcanna1g-dev_3.5b2-46.2_hppa.deb stable/main/binary-hppa/libcanna1g_3.5b2-46.2_hppa.deb stable/main/binary-hppa/canna-utils_3.5b2-46.2_hppa.deb stable/main/binary-hppa/canna_3.5b2-46.2_hppa.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-arm/canna_3.5b2-46.2_arm.deb stable/main/binary-arm/canna-utils_3.5b2-46.2_arm.deb stable/main/binary-arm/libcanna1g-dev_3.5b2-46.2_arm.deb stable/main/binary-arm/libcanna1g_3.5b2-46.2_arm.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-alpha/libcanna1g_3.5b2-46.2_alpha.deb stable/main/binary-alpha/canna-utils_3.5b2-46.2_alpha.deb stable/main/binary-alpha/canna_3.5b2-46.2_alpha.deb stable/main/binary-alpha/libcanna1g-dev_3.5b2-46.2_alpha.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-sparc/libcanna1g-dev_3.5b2-46.2_sparc.deb stable/main/binary-sparc/canna-utils_3.5b2-46.2_sparc.deb stable/main/binary-sparc/canna_3.5b2-46.2_sparc.deb stable/main/source/canna_3.5b2-46.2.diff.gz stable/main/binary-sparc/libcanna1g_3.5b2-46.2_sparc.deb stable/main/source/canna_3.5b2-46.2.dsc canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/source/bugzilla_2.14.2-0woody4.diff.gz stable/main/source/bugzilla_2.14.2-0woody4.dsc stable/main/binary-all/bugzilla-doc_2.14.2-0woody4_all.deb stable/main/binary-all/bugzilla_2.14.2-0woody4_all.deb bugzilla (2.14.2-0woody4) stable-security; urgency=low * Non-maintainer upload by the security team * Apply upstream's fixes for two security bugs - collectstats.pl setting world-writable permissions http://bugzilla.mozilla.org/show_bug.cgi?id=183188 - Checksetup leaves editor backups of localconfig accessible http://bugzilla.mozilla.org/show_bug.cgi?id=186383 stable/main/binary-sparc/bind-dev_8.3.3-2.0woody1_sparc.deb stable/main/binary-sparc/bind_8.3.3-2.0woody1_sparc.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-s390/bind_8.3.3-2.0woody1_s390.deb stable/main/binary-s390/bind-dev_8.3.3-2.0woody1_s390.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody1_powerpc.deb stable/main/binary-powerpc/bind_8.3.3-2.0woody1_powerpc.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-mipsel/bind_8.3.3-2.0woody1_mipsel.deb stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody1_mipsel.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-mips/bind_8.3.3-2.0woody1_mips.deb stable/main/binary-mips/bind-dev_8.3.3-2.0woody1_mips.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-m68k/bind-dev_8.3.3-2.0woody1_m68k.deb stable/main/binary-m68k/bind_8.3.3-2.0woody1_m68k.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-ia64/bind_8.3.3-2.0woody1_ia64.deb stable/main/binary-ia64/bind-dev_8.3.3-2.0woody1_ia64.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-hppa/bind_8.3.3-2.0woody1_hppa.deb stable/main/binary-hppa/bind-dev_8.3.3-2.0woody1_hppa.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-arm/bind_8.3.3-2.0woody1_arm.deb stable/main/binary-arm/bind-dev_8.3.3-2.0woody1_arm.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-alpha/bind_8.3.3-2.0woody1_alpha.deb stable/main/binary-alpha/bind-dev_8.3.3-2.0woody1_alpha.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/source/bind_8.3.3-2.0woody1.dsc stable/main/binary-i386/bind_8.3.3-2.0woody1_i386.deb stable/main/binary-i386/bind-dev_8.3.3-2.0woody1_i386.deb stable/main/source/bind_8.3.3-2.0woody1.diff.gz stable/main/binary-all/bind-doc_8.3.3-2.0woody1_all.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-sparc/balsa_1.2.4-2.2_sparc.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-s390/balsa_1.2.4-2.2_s390.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-powerpc/balsa_1.2.4-2.2_powerpc.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mipsel/balsa_1.2.4-2.2_mipsel.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mips/balsa_1.2.4-2.2_mips.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-m68k/balsa_1.2.4-2.2_m68k.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-ia64/balsa_1.2.4-2.2_ia64.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-i386/balsa_1.2.4-2.2_i386.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-hppa/balsa_1.2.4-2.2_hppa.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-arm/balsa_1.2.4-2.2_arm.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/source/balsa_1.2.4-2.2.diff.gz stable/main/source/balsa_1.2.4-2.2.dsc stable/main/binary-alpha/balsa_1.2.4-2.2_alpha.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/contrib/binary-sparc/autorespond_2.0.2-2woody1_sparc.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-s390/autorespond_2.0.2-2woody1_s390.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-powerpc/autorespond_2.0.2-2woody1_powerpc.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-mipsel/autorespond_2.0.2-2woody1_mipsel.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-mips/autorespond_2.0.2-2woody1_mips.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-m68k/autorespond_2.0.2-2woody1_m68k.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-ia64/autorespond_2.0.2-2woody1_ia64.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-hppa/autorespond_2.0.2-2woody1_hppa.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-arm/autorespond_2.0.2-2woody1_arm.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-alpha/autorespond_2.0.2-2woody1_alpha.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-i386/autorespond_2.0.2-2woody1_i386.deb stable/contrib/source/autorespond_2.0.2-2woody1.dsc stable/contrib/source/autorespond_2.0.2-2woody1.diff.gz autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/main/binary-sparc/atftp_0.6.0woody1_sparc.deb stable/main/binary-sparc/atftpd_0.6.0woody1_sparc.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-s390/atftpd_0.6.0woody1_s390.deb stable/main/binary-s390/atftp_0.6.0woody1_s390.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-powerpc/atftpd_0.6.0woody1_powerpc.deb stable/main/binary-powerpc/atftp_0.6.0woody1_powerpc.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-mipsel/atftpd_0.6.0woody1_mipsel.deb stable/main/binary-mipsel/atftp_0.6.0woody1_mipsel.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-mips/atftpd_0.6.0woody1_mips.deb stable/main/binary-mips/atftp_0.6.0woody1_mips.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-m68k/atftp_0.6.0woody1_m68k.deb stable/main/binary-m68k/atftpd_0.6.0woody1_m68k.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-ia64/atftpd_0.6.0woody1_ia64.deb stable/main/binary-ia64/atftp_0.6.0woody1_ia64.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-hppa/atftpd_0.6.0woody1_hppa.deb stable/main/binary-hppa/atftp_0.6.0woody1_hppa.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-arm/atftpd_0.6.0woody1_arm.deb stable/main/binary-arm/atftp_0.6.0woody1_arm.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-alpha/atftpd_0.6.0woody1_alpha.deb stable/main/binary-alpha/atftp_0.6.0woody1_alpha.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-i386/atftp_0.6.0woody1_i386.deb stable/main/source/atftp_0.6.0woody1.dsc stable/main/source/atftp_0.6.0woody1.tar.gz stable/main/binary-i386/atftpd_0.6.0woody1_i386.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-s390/apcupsd_3.8.5-1.1.1_s390.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-powerpc/apcupsd_3.8.5-1.1.1_powerpc.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-mipsel/apcupsd_3.8.5-1.1.1_mipsel.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-mips/apcupsd_3.8.5-1.1.1_mips.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-m68k/apcupsd_3.8.5-1.1.1_m68k.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-ia64/apcupsd_3.8.5-1.1.1_ia64.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-i386/apcupsd_3.8.5-1.1.1_i386.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-hppa/apcupsd_3.8.5-1.1.1_hppa.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-arm/apcupsd_3.8.5-1.1.1_arm.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-alpha/apcupsd_3.8.5-1.1.1_alpha.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/source/apcupsd_3.8.5-1.1.1.diff.gz stable/main/binary-sparc/apcupsd_3.8.5-1.1.1_sparc.deb stable/main/source/apcupsd_3.8.5-1.1.1.dsc apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-sparc/acm_5.0-3.woody.1_sparc.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-s390/acm_5.0-3.woody.1_s390.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-powerpc/acm_5.0-3.woody.1_powerpc.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-mipsel/acm_5.0-3.woody.1_mipsel.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-mips/acm_5.0-3.woody.1_mips.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-m68k/acm_5.0-3.woody.1_m68k.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-ia64/acm_5.0-3.woody.1_ia64.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-hppa/acm_5.0-3.woody.1_hppa.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-arm/acm_5.0-3.woody.1_arm.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-alpha/acm_5.0-3.woody.1_alpha.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/source/acm_5.0-3.woody.1.diff.gz stable/main/source/acm_5.0-3.woody.1.dsc stable/main/binary-i386/acm_5.0-3.woody.1_i386.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). ========================================= Mon, 16 Dec 2002 - Debian 3.0r1a released ========================================= No changes other than regenerated Packages files to include Task: fields that were dropped in 3.0r1 due to a config SNAFU. :-( ========================================= Sun, 15 Dec 2002 - Debian 3.0r1 released ========================================= Removed the following packages from stable: cdrdao | 1:1.1.5-3.1 | source, alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390 gcdmaster | 1:1.1.5-3.1 | alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390 (Reason: requested by Stable Release Manager) "Upstream reported: Due to license issues with the libedc_ecc library that is used by and distributed with cdrdao I have to temporarily freeze this project. All releases have been removed. See http://sourceforge.net/forum/forum.php?forum_id=213313 See http://bugs.debian.org/162788" kernel-doc-2.2.20 | 2.2.20-5 | all kernel-headers-2.2.20 | 2.2.20-4 | alpha kernel-image-2.2.20-alpha | 2.2.20-4 | source kernel-image-2.2.20-generic | 2.2.20-4 | alpha kernel-image-2.2.20-jensen | 2.2.20-4 | alpha kernel-image-2.2.20-nautilus | 2.2.20-4 | alpha kernel-image-2.2.20-smp | 2.2.20-4 | alpha kernel-source-2.2.20 | 2.2.20-5 | source, all pcmcia-modules-2.2.20 | 3.1.33-6k5 | i386 pcmcia-modules-2.2.20-compact | 3.1.33-6k5 | i386 pcmcia-modules-2.2.20-idepci | 3.1.33-6k5 | i386 (Reason: requested by Stable Release Manager) "Superseded by 2.2.22." ---- stable/main/binary-sparc/yaclc_1.3.6.1_sparc.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-s390/yaclc_1.3.6.1_s390.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-powerpc/yaclc_1.3.6.1_powerpc.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-mipsel/yaclc_1.3.6.1_mipsel.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-mips/yaclc_1.3.6.1_mips.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-m68k/yaclc_1.3.6.1_m68k.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-ia64/yaclc_1.3.6.1_ia64.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-i386/yaclc_1.3.6.1_i386.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-hppa/yaclc_1.3.6.1_hppa.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-arm/yaclc_1.3.6.1_arm.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/source/yaclc_1.3.6.1.dsc stable/main/binary-alpha/yaclc_1.3.6.1_alpha.deb stable/main/source/yaclc_1.3.6.1.tar.gz yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-s390/xinetd_2.3.4-1.2_s390.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-powerpc/xinetd_2.3.4-1.2_powerpc.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-mipsel/xinetd_2.3.4-1.2_mipsel.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-mips/xinetd_2.3.4-1.2_mips.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-m68k/xinetd_2.3.4-1.2_m68k.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-ia64/xinetd_2.3.4-1.2_ia64.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-i386/xinetd_2.3.4-1.2_i386.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-hppa/xinetd_2.3.4-1.2_hppa.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-arm/xinetd_2.3.4-1.2_arm.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-alpha/xinetd_2.3.4-1.2_alpha.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-sparc/xinetd_2.3.4-1.2_sparc.deb stable/main/source/xinetd_2.3.4-1.2.dsc stable/main/source/xinetd_2.3.4-1.2.diff.gz xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-s390/wwwoffle_2.7a-1.2_s390.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-powerpc/wwwoffle_2.7a-1.2_powerpc.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-mipsel/wwwoffle_2.7a-1.2_mipsel.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-mips/wwwoffle_2.7a-1.2_mips.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-m68k/wwwoffle_2.7a-1.2_m68k.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-ia64/wwwoffle_2.7a-1.2_ia64.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-i386/wwwoffle_2.7a-1.2_i386.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-hppa/wwwoffle_2.7a-1.2_hppa.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-arm/wwwoffle_2.7a-1.2_arm.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-alpha/wwwoffle_2.7a-1.2_alpha.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/source/wwwoffle_2.7a-1.2.dsc stable/main/source/wwwoffle_2.7a-1.2.diff.gz stable/main/binary-sparc/wwwoffle_2.7a-1.2_sparc.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-sparc/weex_2.6.1-4woody1_sparc.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-s390/weex_2.6.1-4woody1_s390.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-powerpc/weex_2.6.1-4woody1_powerpc.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-mipsel/weex_2.6.1-4woody1_mipsel.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-mips/weex_2.6.1-4woody1_mips.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-m68k/weex_2.6.1-4woody1_m68k.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-ia64/weex_2.6.1-4woody1_ia64.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-hppa/weex_2.6.1-4woody1_hppa.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-arm/weex_2.6.1-4woody1_arm.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-alpha/weex_2.6.1-4woody1_alpha.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/source/weex_2.6.1-4woody1.dsc stable/main/binary-i386/weex_2.6.1-4woody1_i386.deb stable/main/source/weex_2.6.1-4woody1.diff.gz weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-sparc/uptimed_0.1.7-2woody0_sparc.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-s390/uptimed_0.1.7-2woody0_s390.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-powerpc/uptimed_0.1.7-2woody0_powerpc.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-mipsel/uptimed_0.1.7-2woody0_mipsel.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-mips/uptimed_0.1.7-2woody0_mips.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-m68k/uptimed_0.1.7-2woody0_m68k.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-ia64/uptimed_0.1.7-2woody0_ia64.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-hppa/uptimed_0.1.7-2woody0_hppa.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-arm/uptimed_0.1.7-2woody0_arm.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-alpha/uptimed_0.1.7-2woody0_alpha.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/source/uptimed_0.1.7-2woody0.dsc stable/main/binary-i386/uptimed_0.1.7-2woody0_i386.deb stable/main/binary-all/uprecords-cgi_0.1.7-2woody0_all.deb stable/main/source/uptimed_0.1.7-2woody0.diff.gz uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody1_all.deb stable/contrib/source/tomcat4_4.0.3-3woody1.dsc stable/contrib/source/tomcat4_4.0.3-3woody1.diff.gz stable/contrib/binary-all/tomcat4_4.0.3-3woody1_all.deb stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody1_all.deb tomcat4 (4.0.3-3woody1) stable-security; urgency=high * Include security patch from Tomcat 4.0.5 which fixes a JSP source disclosure vulnerability stable/main/binary-s390/tkmail_4.0beta9-8.1_s390.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-powerpc/tkmail_4.0beta9-8.1_powerpc.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-mipsel/tkmail_4.0beta9-8.1_mipsel.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-mips/tkmail_4.0beta9-8.1_mips.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-m68k/tkmail_4.0beta9-8.1_m68k.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-ia64/tkmail_4.0beta9-8.1_ia64.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-i386/tkmail_4.0beta9-8.1_i386.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-hppa/tkmail_4.0beta9-8.1_hppa.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-arm/tkmail_4.0beta9-8.1_arm.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-alpha/tkmail_4.0beta9-8.1_alpha.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/source/tkmail_4.0beta9-8.1.dsc stable/main/source/tkmail_4.0beta9-8.1.diff.gz stable/main/binary-sparc/tkmail_4.0beta9-8.1_sparc.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-s390/tinyproxy_1.4.3-2woody2_s390.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-powerpc/tinyproxy_1.4.3-2woody2_powerpc.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-mipsel/tinyproxy_1.4.3-2woody2_mipsel.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-mips/tinyproxy_1.4.3-2woody2_mips.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-m68k/tinyproxy_1.4.3-2woody2_m68k.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-ia64/tinyproxy_1.4.3-2woody2_ia64.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-i386/tinyproxy_1.4.3-2woody2_i386.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-hppa/tinyproxy_1.4.3-2woody2_hppa.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-arm/tinyproxy_1.4.3-2woody2_arm.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-alpha/tinyproxy_1.4.3-2woody2_alpha.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/source/tinyproxy_1.4.3-2woody2.diff.gz stable/main/binary-sparc/tinyproxy_1.4.3-2woody2_sparc.deb stable/main/source/tinyproxy_1.4.3-2woody2.dsc tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.1_sparc.deb stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.1_sparc.deb stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.1_sparc.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.1_s390.deb stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.1_s390.deb stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.1_s390.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.1_powerpc.deb stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.1_powerpc.deb stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.1_powerpc.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.1_mips.deb stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.1_mips.deb stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.1_mips.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.1_m68k.deb stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.1_m68k.deb stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.1_m68k.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.1_ia64.deb stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.1_ia64.deb stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.1_ia64.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.1_i386.deb stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.1_i386.deb stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.1_i386.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.1_hppa.deb stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.1_hppa.deb stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.1_hppa.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.1_arm.deb stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.1_arm.deb stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.1_arm.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.1_alpha.deb stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.1_alpha.deb stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.1_alpha.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/source/tetex-bin_1.0.7+20011202-7.1.dsc stable/main/source/tetex-bin_1.0.7+20011202-7.1.tar.gz stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.1_mipsel.deb stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.1_mipsel.deb stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.1_mipsel.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/source/tendra_4.1.2-9.woody1.diff.gz stable/main/binary-i386/tendra_4.1.2-9.woody1_i386.deb stable/main/source/tendra_4.1.2-9.woody1.dsc tendra (4.1.2-9.woody1) stable; urgency=low * Don't copy runtime files. stable/main/binary-sparc/tcpdump_3.6.2-2.2_sparc.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-s390/tcpdump_3.6.2-2.2_s390.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-powerpc/tcpdump_3.6.2-2.2_powerpc.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-mipsel/tcpdump_3.6.2-2.2_mipsel.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-mips/tcpdump_3.6.2-2.2_mips.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-m68k/tcpdump_3.6.2-2.2_m68k.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-ia64/tcpdump_3.6.2-2.2_ia64.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-hppa/tcpdump_3.6.2-2.2_hppa.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-arm/tcpdump_3.6.2-2.2_arm.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-alpha/tcpdump_3.6.2-2.2_alpha.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/source/tcpdump_3.6.2-2.2.dsc stable/main/source/tcpdump_3.6.2-2.2.diff.gz stable/main/binary-i386/tcpdump_3.6.2-2.2_i386.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-sparc/sympa_3.3.3-3_sparc.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-s390/sympa_3.3.3-3_s390.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-powerpc/sympa_3.3.3-3_powerpc.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-mipsel/sympa_3.3.3-3_mipsel.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-mips/sympa_3.3.3-3_mips.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-m68k/sympa_3.3.3-3_m68k.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-ia64/sympa_3.3.3-3_ia64.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-hppa/sympa_3.3.3-3_hppa.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-arm/sympa_3.3.3-3_arm.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-alpha/sympa_3.3.3-3_alpha.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/source/sympa_3.3.3-3.diff.gz stable/main/source/sympa_3.3.3-3.dsc stable/main/binary-i386/sympa_3.3.3-3_i386.deb stable/main/binary-all/wwsympa_3.3.3-3_all.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-sparc/super_3.16.1-1.1_sparc.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-s390/super_3.16.1-1.1_s390.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-powerpc/super_3.16.1-1.1_powerpc.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-mipsel/super_3.16.1-1.1_mipsel.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-mips/super_3.16.1-1.1_mips.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-ia64/super_3.16.1-1.1_ia64.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-i386/super_3.16.1-1.1_i386.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-hppa/super_3.16.1-1.1_hppa.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-arm/super_3.16.1-1.1_arm.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-alpha/super_3.16.1-1.1_alpha.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/source/super_3.16.1-1.1.diff.gz stable/main/binary-m68k/super_3.16.1-1.1_m68k.deb stable/main/source/super_3.16.1-1.1.dsc super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/source/squirrelmail_1.2.6-1.2.diff.gz stable/main/binary-all/squirrelmail_1.2.6-1.2_all.deb stable/main/source/squirrelmail_1.2.6-1.2.dsc squirrelmail (1:1.2.6-1.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Fixed the options page, whoops stable/main/binary-sparc/snort-mysql_1.8.4beta1-3_sparc.deb stable/main/binary-sparc/snort-common_1.8.4beta1-3_sparc.deb stable/main/binary-sparc/snort_1.8.4beta1-3_sparc.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-s390/snort_1.8.4beta1-3_s390.deb stable/main/binary-s390/snort-mysql_1.8.4beta1-3_s390.deb stable/main/binary-s390/snort-common_1.8.4beta1-3_s390.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-powerpc/snort-common_1.8.4beta1-3_powerpc.deb stable/main/binary-powerpc/snort_1.8.4beta1-3_powerpc.deb stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3_powerpc.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3_mipsel.deb stable/main/binary-mipsel/snort_1.8.4beta1-3_mipsel.deb stable/main/binary-mipsel/snort-common_1.8.4beta1-3_mipsel.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-mips/snort-common_1.8.4beta1-3_mips.deb stable/main/binary-mips/snort_1.8.4beta1-3_mips.deb stable/main/binary-mips/snort-mysql_1.8.4beta1-3_mips.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-m68k/snort-common_1.8.4beta1-3_m68k.deb stable/main/binary-m68k/snort-mysql_1.8.4beta1-3_m68k.deb stable/main/binary-m68k/snort_1.8.4beta1-3_m68k.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-ia64/snort-mysql_1.8.4beta1-3_ia64.deb stable/main/binary-ia64/snort-common_1.8.4beta1-3_ia64.deb stable/main/binary-ia64/snort_1.8.4beta1-3_ia64.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-hppa/snort-mysql_1.8.4beta1-3_hppa.deb stable/main/binary-hppa/snort_1.8.4beta1-3_hppa.deb stable/main/binary-hppa/snort-common_1.8.4beta1-3_hppa.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-arm/snort_1.8.4beta1-3_arm.deb stable/main/binary-arm/snort-mysql_1.8.4beta1-3_arm.deb stable/main/binary-arm/snort-common_1.8.4beta1-3_arm.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-alpha/snort_1.8.4beta1-3_alpha.deb stable/main/binary-alpha/snort-common_1.8.4beta1-3_alpha.deb stable/main/binary-alpha/snort-mysql_1.8.4beta1-3_alpha.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-all/snort-rules-default_1.8.4beta1-3_all.deb stable/main/source/snort_1.8.4beta1-3.diff.gz stable/main/binary-i386/snort-common_1.8.4beta1-3_i386.deb stable/main/source/snort_1.8.4beta1-3.dsc stable/main/binary-i386/snort-mysql_1.8.4beta1-3_i386.deb stable/main/binary-i386/snort_1.8.4beta1-3_i386.deb stable/main/binary-all/snort-doc_1.8.4beta1-3_all.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-sparc/silo_1.2.5-2_sparc.deb stable/main/source/silo_1.2.5-2.diff.gz stable/main/source/silo_1.2.5-2.dsc silo (1.2.5-2) stable; urgency=low * Add patch for UltraSPARC III+ (Cheetah+) support from DaveM. stable/main/binary-s390/libscrollkeeper0_0.3.6-3.1_s390.deb stable/main/binary-s390/libscrollkeeper-dev_0.3.6-3.1_s390.deb stable/main/binary-s390/scrollkeeper_0.3.6-3.1_s390.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-powerpc/libscrollkeeper0_0.3.6-3.1_powerpc.deb stable/main/binary-powerpc/scrollkeeper_0.3.6-3.1_powerpc.deb stable/main/binary-powerpc/libscrollkeeper-dev_0.3.6-3.1_powerpc.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-mipsel/libscrollkeeper0_0.3.6-3.1_mipsel.deb stable/main/binary-mipsel/libscrollkeeper-dev_0.3.6-3.1_mipsel.deb stable/main/binary-mipsel/scrollkeeper_0.3.6-3.1_mipsel.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-mips/libscrollkeeper0_0.3.6-3.1_mips.deb stable/main/binary-mips/libscrollkeeper-dev_0.3.6-3.1_mips.deb stable/main/binary-mips/scrollkeeper_0.3.6-3.1_mips.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-m68k/libscrollkeeper0_0.3.6-3.1_m68k.deb stable/main/binary-m68k/libscrollkeeper-dev_0.3.6-3.1_m68k.deb stable/main/binary-m68k/scrollkeeper_0.3.6-3.1_m68k.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-ia64/libscrollkeeper0_0.3.6-3.1_ia64.deb stable/main/binary-ia64/scrollkeeper_0.3.6-3.1_ia64.deb stable/main/binary-ia64/libscrollkeeper-dev_0.3.6-3.1_ia64.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-i386/libscrollkeeper-dev_0.3.6-3.1_i386.deb stable/main/binary-i386/scrollkeeper_0.3.6-3.1_i386.deb stable/main/binary-i386/libscrollkeeper0_0.3.6-3.1_i386.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-hppa/libscrollkeeper0_0.3.6-3.1_hppa.deb stable/main/binary-hppa/libscrollkeeper-dev_0.3.6-3.1_hppa.deb stable/main/binary-hppa/scrollkeeper_0.3.6-3.1_hppa.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-arm/libscrollkeeper-dev_0.3.6-3.1_arm.deb stable/main/binary-arm/libscrollkeeper0_0.3.6-3.1_arm.deb stable/main/binary-arm/scrollkeeper_0.3.6-3.1_arm.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-alpha/scrollkeeper_0.3.6-3.1_alpha.deb stable/main/binary-alpha/libscrollkeeper0_0.3.6-3.1_alpha.deb stable/main/binary-alpha/libscrollkeeper-dev_0.3.6-3.1_alpha.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-sparc/libscrollkeeper-dev_0.3.6-3.1_sparc.deb stable/main/binary-sparc/libscrollkeeper0_0.3.6-3.1_sparc.deb stable/main/source/scrollkeeper_0.3.6-3.1.dsc stable/main/binary-sparc/scrollkeeper_0.3.6-3.1_sparc.deb stable/main/source/scrollkeeper_0.3.6-3.1.diff.gz scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-sparc/samba_2.2.3a-12_sparc.deb stable/main/binary-sparc/libpam-smbpass_2.2.3a-12_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-12_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-12_sparc.deb stable/main/binary-sparc/samba-common_2.2.3a-12_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-12_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-12_sparc.deb stable/main/binary-sparc/swat_2.2.3a-12_sparc.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-s390/libsmbclient-dev_2.2.3a-12_s390.deb stable/main/binary-s390/libpam-smbpass_2.2.3a-12_s390.deb stable/main/binary-s390/smbclient_2.2.3a-12_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-12_s390.deb stable/main/binary-s390/samba-common_2.2.3a-12_s390.deb stable/main/binary-s390/smbfs_2.2.3a-12_s390.deb stable/main/binary-s390/samba_2.2.3a-12_s390.deb stable/main/binary-s390/swat_2.2.3a-12_s390.deb stable/main/binary-s390/winbind_2.2.3a-12_s390.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-powerpc/winbind_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/samba_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12_powerpc.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-mipsel/smbclient_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/smbfs_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/samba-common_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-12_mipsel.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-mips/swat_2.2.3a-12_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-12_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-12_mips.deb stable/main/binary-mips/smbfs_2.2.3a-12_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-12_mips.deb stable/main/binary-mips/samba-common_2.2.3a-12_mips.deb stable/main/binary-mips/smbclient_2.2.3a-12_mips.deb stable/main/binary-mips/winbind_2.2.3a-12_mips.deb stable/main/binary-mips/samba_2.2.3a-12_mips.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-m68k/swat_2.2.3a-12_m68k.deb stable/main/binary-m68k/samba_2.2.3a-12_m68k.deb stable/main/binary-m68k/winbind_2.2.3a-12_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-12_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-12_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12_m68k.deb stable/main/binary-m68k/samba-common_2.2.3a-12_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-12_m68k.deb stable/main/binary-m68k/smbfs_2.2.3a-12_m68k.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-ia64/libsmbclient_2.2.3a-12_ia64.deb stable/main/binary-ia64/smbfs_2.2.3a-12_ia64.deb stable/main/binary-ia64/swat_2.2.3a-12_ia64.deb stable/main/binary-ia64/samba_2.2.3a-12_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-12_ia64.deb stable/main/binary-ia64/smbclient_2.2.3a-12_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-12_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-12_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12_ia64.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-hppa/libsmbclient_2.2.3a-12_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-12_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-12_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-12_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-12_hppa.deb stable/main/binary-hppa/swat_2.2.3a-12_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-12_hppa.deb stable/main/binary-hppa/samba_2.2.3a-12_hppa.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-arm/samba-common_2.2.3a-12_arm.deb stable/main/binary-arm/smbfs_2.2.3a-12_arm.deb stable/main/binary-arm/winbind_2.2.3a-12_arm.deb stable/main/binary-arm/swat_2.2.3a-12_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-12_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-12_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-12_arm.deb stable/main/binary-arm/smbclient_2.2.3a-12_arm.deb stable/main/binary-arm/samba_2.2.3a-12_arm.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-alpha/libpam-smbpass_2.2.3a-12_alpha.deb stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-12_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-12_alpha.deb stable/main/binary-alpha/swat_2.2.3a-12_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-12_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-12_alpha.deb stable/main/binary-alpha/smbclient_2.2.3a-12_alpha.deb stable/main/binary-alpha/samba_2.2.3a-12_alpha.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-all/samba-doc_2.2.3a-12_all.deb stable/main/binary-i386/libpam-smbpass_2.2.3a-12_i386.deb stable/main/binary-i386/samba_2.2.3a-12_i386.deb stable/main/binary-i386/samba-common_2.2.3a-12_i386.deb stable/main/source/samba_2.2.3a-12.diff.gz stable/main/source/samba_2.2.3a-12.dsc stable/main/binary-i386/winbind_2.2.3a-12_i386.deb stable/main/binary-i386/smbfs_2.2.3a-12_i386.deb stable/main/binary-i386/smbclient_2.2.3a-12_i386.deb stable/main/binary-i386/libsmbclient-dev_2.2.3a-12_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-12_i386.deb stable/main/binary-i386/swat_2.2.3a-12_i386.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-sparc/librio500-dev_0.7-7woody2_sparc.deb stable/main/binary-sparc/rio500_0.7-7woody2_sparc.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-s390/librio500-dev_0.7-7woody2_s390.deb stable/main/binary-s390/rio500_0.7-7woody2_s390.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-powerpc/librio500-dev_0.7-7woody2_powerpc.deb stable/main/binary-powerpc/rio500_0.7-7woody2_powerpc.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-mipsel/librio500-dev_0.7-7woody2_mipsel.deb stable/main/binary-mipsel/rio500_0.7-7woody2_mipsel.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-mips/librio500-dev_0.7-7woody2_mips.deb stable/main/binary-mips/rio500_0.7-7woody2_mips.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-m68k/librio500-dev_0.7-7woody2_m68k.deb stable/main/binary-m68k/rio500_0.7-7woody2_m68k.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-ia64/librio500-dev_0.7-7woody2_ia64.deb stable/main/binary-ia64/rio500_0.7-7woody2_ia64.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-hppa/librio500-dev_0.7-7woody2_hppa.deb stable/main/binary-hppa/rio500_0.7-7woody2_hppa.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-arm/rio500_0.7-7woody2_arm.deb stable/main/binary-arm/librio500-dev_0.7-7woody2_arm.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-alpha/rio500_0.7-7woody2_alpha.deb stable/main/binary-alpha/librio500-dev_0.7-7woody2_alpha.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-i386/librio500-dev_0.7-7woody2_i386.deb stable/main/source/rio500_0.7-7woody2.diff.gz stable/main/binary-i386/rio500_0.7-7woody2_i386.deb stable/main/source/rio500_0.7-7woody2.dsc rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-sparc/qpopper_4.0.4-2.woody.1_sparc.deb stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.1_sparc.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-s390/qpopper_4.0.4-2.woody.1_s390.deb stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.1_s390.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-powerpc/qpopper_4.0.4-2.woody.1_powerpc.deb stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.1_powerpc.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-mipsel/qpopper_4.0.4-2.woody.1_mipsel.deb stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.1_mipsel.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-mips/qpopper_4.0.4-2.woody.1_mips.deb stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.1_mips.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.1_m68k.deb stable/main/binary-m68k/qpopper_4.0.4-2.woody.1_m68k.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-ia64/qpopper_4.0.4-2.woody.1_ia64.deb stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.1_ia64.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-hppa/qpopper_4.0.4-2.woody.1_hppa.deb stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.1_hppa.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.1_arm.deb stable/main/binary-arm/qpopper_4.0.4-2.woody.1_arm.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.1_alpha.deb stable/main/binary-alpha/qpopper_4.0.4-2.woody.1_alpha.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.1_i386.deb stable/main/source/qpopper_4.0.4-2.woody.1.dsc stable/main/source/qpopper_4.0.4-2.woody.1.diff.gz stable/main/binary-i386/qpopper_4.0.4-2.woody.1_i386.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-s390/python1.5-mpz_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-gdbm_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-tk_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-dev_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5_1.5.2-23.3_s390.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-powerpc/python1.5_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-gdbm_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-tk_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-mpz_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-dev_1.5.2-23.3_powerpc.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-mipsel/python1.5-dev_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-tk_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-mpz_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-gdbm_1.5.2-23.3_mipsel.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-mips/python1.5-gdbm_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-tk_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-dev_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-mpz_1.5.2-23.3_mips.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-m68k/python1.5_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-mpz_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-gdbm_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-dev_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-tk_1.5.2-23.3_m68k.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-ia64/python1.5-dev_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-tk_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-gdbm_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-mpz_1.5.2-23.3_ia64.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-i386/python1.5-mpz_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-gdbm_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-dev_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-tk_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5_1.5.2-23.3_i386.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-hppa/python1.5_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-mpz_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-tk_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-dev_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-gdbm_1.5.2-23.3_hppa.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-arm/python1.5_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-tk_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-mpz_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-dev_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-gdbm_1.5.2-23.3_arm.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-alpha/python1.5-gdbm_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-mpz_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-dev_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-tk_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5_1.5.2-23.3_alpha.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-sparc/python1.5-mpz_1.5.2-23.3_sparc.deb stable/main/binary-sparc/python1.5-tk_1.5.2-23.3_sparc.deb stable/main/binary-sparc/python1.5-dev_1.5.2-23.3_sparc.deb stable/main/source/python1.5_1.5.2-23.3.dsc stable/main/binary-all/idle-python1.5_1.5.2-23.3_all.deb stable/main/binary-sparc/python1.5_1.5.2-23.3_sparc.deb stable/main/binary-all/python1.5-examples_1.5.2-23.3_all.deb stable/main/binary-sparc/python1.5-gdbm_1.5.2-23.3_sparc.deb stable/main/source/python1.5_1.5.2-23.3.diff.gz python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-s390/purity_1-14.2_s390.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-powerpc/purity_1-14.2_powerpc.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-mipsel/purity_1-14.2_mipsel.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-mips/purity_1-14.2_mips.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-m68k/purity_1-14.2_m68k.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-ia64/purity_1-14.2_ia64.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-i386/purity_1-14.2_i386.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-hppa/purity_1-14.2_hppa.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-arm/purity_1-14.2_arm.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-alpha/purity_1-14.2_alpha.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/source/purity_1-14.2.dsc stable/main/source/purity_1-14.2.diff.gz stable/main/binary-sparc/purity_1-14.2_sparc.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-m68k/postfix-tls_1.1.11+tls0.7.15-0.woody1_m68k.deb postfix-tls (1.1.11+tls0.7.15-0.woody1) testing; urgency=low * New postfix release. stable/main/binary-sparc/php4-mysql_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-6_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-gd_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-imap_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-6_sparc.deb stable/main/binary-sparc/php4_4.1.2-6_sparc.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-s390/php4-mhash_4.1.2-6_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-6_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-6_s390.deb stable/main/binary-s390/php4-mcal_4.1.2-6_s390.deb stable/main/binary-s390/php4-imap_4.1.2-6_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-6_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-6_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-6_s390.deb stable/main/binary-s390/php4-recode_4.1.2-6_s390.deb stable/main/binary-s390/php4_4.1.2-6_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-6_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-6_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-6_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-6_s390.deb stable/main/binary-s390/php4-curl_4.1.2-6_s390.deb stable/main/binary-s390/php4-gd_4.1.2-6_s390.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-mipsel/php4-recode_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-gd_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-6_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-6_mipsel.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-mips/php4-domxml_4.1.2-6_mips.deb stable/main/binary-mips/php4_4.1.2-6_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-6_mips.deb stable/main/binary-mips/php4-imap_4.1.2-6_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-6_mips.deb stable/main/binary-mips/php4-recode_4.1.2-6_mips.deb stable/main/binary-mips/php4-sybase_4.1.2-6_mips.deb stable/main/binary-mips/php4-gd_4.1.2-6_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-6_mips.deb stable/main/binary-mips/php4-cgi_4.1.2-6_mips.deb stable/main/binary-mips/php4-curl_4.1.2-6_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-6_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-6_mips.deb stable/main/binary-mips/php4-mhash_4.1.2-6_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-6_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-6_mips.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-m68k/caudium-php4_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-sybase_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-curl_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-6_m68k.deb stable/main/binary-m68k/php4_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-6_m68k.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-ia64/php4-xslt_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-6_ia64.deb stable/main/binary-ia64/php4_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-snmp_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-odbc_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-6_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-gd_4.1.2-6_ia64.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-hppa/php4-imap_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-cgi_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mysql_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-sybase_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-odbc_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-6_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-6_hppa.deb stable/main/binary-hppa/php4_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-gd_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mcal_4.1.2-6_hppa.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-arm/php4-odbc_4.1.2-6_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-6_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-6_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-6_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-6_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-6_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-6_arm.deb stable/main/binary-arm/php4-recode_4.1.2-6_arm.deb stable/main/binary-arm/php4-gd_4.1.2-6_arm.deb stable/main/binary-arm/php4_4.1.2-6_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-6_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-6_arm.deb stable/main/binary-arm/php4-imap_4.1.2-6_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-6_arm.deb stable/main/binary-arm/php4-mhash_4.1.2-6_arm.deb stable/main/binary-arm/php4-curl_4.1.2-6_arm.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-alpha/php4-ldap_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-imap_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mhash_4.1.2-6_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mcal_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-6_alpha.deb stable/main/binary-alpha/php4_4.1.2-6_alpha.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-powerpc/php4-mcal_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-gd_4.1.2-6_i386.deb stable/main/binary-i386/php4_4.1.2-6_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-6_i386.deb stable/main/binary-all/php4-pear_4.1.2-6_all.deb stable/main/binary-i386/php4-ldap_4.1.2-6_i386.deb stable/main/binary-all/php4-dev_4.1.2-6_all.deb stable/main/binary-powerpc/php4-snmp_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-curl_4.1.2-6_i386.deb stable/main/source/php4_4.1.2-6.dsc stable/main/binary-powerpc/php4-sybase_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-mcal_4.1.2-6_i386.deb stable/main/binary-i386/php4-imap_4.1.2-6_i386.deb stable/main/binary-i386/php4-mysql_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-xslt_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-snmp_4.1.2-6_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-6_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-ldap_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-6_powerpc.deb stable/main/source/php4_4.1.2-6.diff.gz stable/main/binary-powerpc/php4-gd_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-xslt_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-domxml_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-cgi_4.1.2-6_i386.deb stable/main/binary-i386/php4-recode_4.1.2-6_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-cgi_4.1.2-6_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-mhash_4.1.2-6_i386.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-xml_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-gd_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-magick_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-dev_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-imap_3.0.18-23.1woody1_sparc.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-s390/php3-dev_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-snmp_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-xml_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-ldap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-imap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-gd_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-mhash_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-mysql_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-magick_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi_3.0.18-23.1woody1_s390.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody1_powerpc.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody1_mipsel.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-mips/php3-gd_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-magick_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-imap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-ldap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-mhash_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-dev_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-snmp_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-xml_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-mysql_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi_3.0.18-23.1woody1_mips.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-dev_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-imap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-xml_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-magick_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-gd_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody1_m68k.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-ia64/php3-dev_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-magick_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-imap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-gd_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-xml_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody1_ia64.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-imap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-xml_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-dev_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-magick_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-gd_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody1_hppa.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-imap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-gd_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-ldap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-dev_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-xml_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-mysql_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-mhash_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-magick_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-snmp_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody1_arm.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-magick_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-xml_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-imap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-gd_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-dev_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody1_alpha.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-i386/php3-dev_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-ldap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-xml_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-mysql_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody1_i386.deb stable/main/source/php3_3.0.18-23.1woody1.dsc stable/main/binary-all/php3-doc_3.0.18-23.1woody1_all.deb stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-mhash_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-imap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-gd_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-magick_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-snmp_3.0.18-23.1woody1_i386.deb stable/main/source/php3_3.0.18-23.1woody1.diff.gz php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-i386/pcmcia-modules-2.2.22_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22. stable/main/binary-i386/pcmcia-modules-2.2.22-idepci_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22-idepci. stable/main/binary-i386/pcmcia-modules-2.2.22-compact_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22-compact. stable/main/binary-ia64/ssh_3.4p1-1_ia64.deb stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1_ia64.deb openssh (1:3.4p1-1) testing; urgency=high * Extend my tendrils back into this package (Closes: #150915, #151098) * thanks to the security team for their work * no thanks to ISS/Theo de Raadt for their handling of these bugs * save old sshd_configs to sshd_config.dpkg-old when auto-generating a new one * tell/ask the user about PriviledgeSeparation * /etc/init.d/ssh run will now create the chroot empty dir if necessary * Remove our previous statoverride on /usr/bin/ssh (only for people upgrading from a version where we'd put one in ourselves!) * Stop slandering Russia, since someone asked so nicely (Closes: #148951) * Reduce the sleep time in /etc/init.d/ssh during a restart stable/main/binary-sparc/openafs-fileserver_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-dbserver_1.2.3final2-6_sparc.deb stable/main/binary-sparc/libopenafs-dev_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-kpasswd_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-client_1.2.3final2-6_sparc.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-s390/libopenafs-dev_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-fileserver_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-kpasswd_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-dbserver_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-client_1.2.3final2-6_s390.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-powerpc/openafs-kpasswd_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-client_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-dbserver_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-fileserver_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/libopenafs-dev_1.2.3final2-6_powerpc.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-alpha/openafs-dbserver_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-fileserver_1.2.3final2-6_alpha.deb stable/main/binary-alpha/libopenafs-dev_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-client_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-kpasswd_1.2.3final2-6_alpha.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-i386/openafs-fileserver_1.2.3final2-6_i386.deb stable/main/binary-i386/libopenafs-dev_1.2.3final2-6_i386.deb stable/main/binary-i386/openafs-dbserver_1.2.3final2-6_i386.deb stable/main/binary-i386/openafs-kpasswd_1.2.3final2-6_i386.deb stable/main/source/openafs_1.2.3final2-6.dsc stable/main/binary-all/openafs-modules-source_1.2.3final2-6_all.deb stable/main/binary-i386/openafs-client_1.2.3final2-6_i386.deb stable/main/source/openafs_1.2.3final2-6.diff.gz openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-sparc/octave2.1_2.1.35-7woody1_sparc.deb stable/main/binary-sparc/octave2.1-headers_2.1.35-7woody1_sparc.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-s390/octave2.1-headers_2.1.35-7woody1_s390.deb stable/main/binary-s390/octave2.1_2.1.35-7woody1_s390.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-powerpc/octave2.1_2.1.35-7woody1_powerpc.deb stable/main/binary-powerpc/octave2.1-headers_2.1.35-7woody1_powerpc.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-mipsel/octave2.1_2.1.35-7woody1_mipsel.deb stable/main/binary-mipsel/octave2.1-headers_2.1.35-7woody1_mipsel.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-mips/octave2.1-headers_2.1.35-7woody1_mips.deb stable/main/binary-mips/octave2.1_2.1.35-7woody1_mips.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-m68k/octave2.1_2.1.35-7woody1_m68k.deb stable/main/binary-m68k/octave2.1-headers_2.1.35-7woody1_m68k.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-ia64/octave2.1_2.1.35-7woody1_ia64.deb stable/main/binary-ia64/octave2.1-headers_2.1.35-7woody1_ia64.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-hppa/octave2.1-headers_2.1.35-7woody1_hppa.deb stable/main/binary-hppa/octave2.1_2.1.35-7woody1_hppa.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-alpha/octave2.1-headers_2.1.35-7woody1_alpha.deb stable/main/binary-alpha/octave2.1_2.1.35-7woody1_alpha.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-i386/octave2.1_2.1.35-7woody1_i386.deb stable/main/source/octave2.1_2.1.35-7woody1.dsc stable/main/binary-all/octave2.1-htmldoc_2.1.35-7woody1_all.deb stable/main/binary-i386/octave2.1-headers_2.1.35-7woody1_i386.deb stable/main/binary-all/octave2.1-info_2.1.35-7woody1_all.deb stable/main/binary-all/octave2.1-emacsen_2.1.35-7woody1_all.deb stable/main/source/octave2.1_2.1.35-7woody1.diff.gz stable/main/binary-all/octave2.1-doc_2.1.35-7woody1_all.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-sparc/ocaml_3.04-14_sparc.deb stable/main/binary-sparc/ocaml-native-compilers_3.04-14_sparc.deb stable/main/binary-sparc/ocaml-base_3.04-14_sparc.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-s390/ocaml-base_3.04-14_s390.deb stable/main/binary-s390/ocaml_3.04-14_s390.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-powerpc/ocaml-native-compilers_3.04-14_powerpc.deb stable/main/binary-powerpc/ocaml_3.04-14_powerpc.deb stable/main/binary-powerpc/ocaml-base_3.04-14_powerpc.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-mipsel/ocaml-base_3.04-14_mipsel.deb stable/main/binary-mipsel/ocaml_3.04-14_mipsel.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-mips/ocaml-base_3.04-14_mips.deb stable/main/binary-mips/ocaml_3.04-14_mips.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-m68k/ocaml_3.04-14_m68k.deb stable/main/binary-m68k/ocaml-base_3.04-14_m68k.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-ia64/ocaml-base_3.04-14_ia64.deb stable/main/binary-ia64/ocaml_3.04-14_ia64.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-i386/ocaml-base_3.04-14_i386.deb stable/main/binary-i386/ocaml-native-compilers_3.04-14_i386.deb stable/main/binary-i386/ocaml_3.04-14_i386.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-hppa/ocaml-base_3.04-14_hppa.deb stable/main/binary-hppa/ocaml_3.04-14_hppa.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-arm/ocaml_3.04-14_arm.deb stable/main/binary-arm/ocaml-base_3.04-14_arm.deb stable/main/binary-arm/ocaml-native-compilers_3.04-14_arm.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-all/ocaml-source_3.04-14_all.deb stable/main/source/ocaml_3.04-14.diff.gz stable/main/binary-alpha/ocaml-base_3.04-14_alpha.deb stable/main/binary-alpha/ocaml_3.04-14_alpha.deb stable/main/binary-alpha/ocaml-native-compilers_3.04-14_alpha.deb stable/main/source/ocaml_3.04-14.dsc ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-s390/nullmailer_1.00RC5-16.1woody2_s390.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-powerpc/nullmailer_1.00RC5-16.1woody2_powerpc.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-mipsel/nullmailer_1.00RC5-16.1woody2_mipsel.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-mips/nullmailer_1.00RC5-16.1woody2_mips.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-m68k/nullmailer_1.00RC5-16.1woody2_m68k.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-ia64/nullmailer_1.00RC5-16.1woody2_ia64.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-i386/nullmailer_1.00RC5-16.1woody2_i386.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-hppa/nullmailer_1.00RC5-16.1woody2_hppa.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-arm/nullmailer_1.00RC5-16.1woody2_arm.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-alpha/nullmailer_1.00RC5-16.1woody2_alpha.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-sparc/nullmailer_1.00RC5-16.1woody2_sparc.deb stable/main/source/nullmailer_1.00RC5-16.1woody2.diff.gz stable/main/source/nullmailer_1.00RC5-16.1woody2.dsc nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-s390/nis_3.9-6.1_s390.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-powerpc/nis_3.9-6.1_powerpc.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-mipsel/nis_3.9-6.1_mipsel.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-mips/nis_3.9-6.1_mips.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-m68k/nis_3.9-6.1_m68k.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-ia64/nis_3.9-6.1_ia64.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-i386/nis_3.9-6.1_i386.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-hppa/nis_3.9-6.1_hppa.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-arm/nis_3.9-6.1_arm.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-alpha/nis_3.9-6.1_alpha.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-sparc/nis_3.9-6.1_sparc.deb stable/main/source/nis_3.9-6.1.dsc stable/main/source/nis_3.9-6.1.diff.gz nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-s390/libnessus-dev_1.0.10-2.0.1_s390.deb stable/main/binary-s390/libnessus1_1.0.10-2.0.1_s390.deb nessus-libraries (1.0.10-2.0.1) stable; urgency=low * Binary NMU to get rid of the libgmp3 library name, so that nessus-core builds. stable/main/binary-s390/nessusd_1.0.10-2.0.1_s390.deb stable/main/binary-s390/nessus_1.0.10-2.0.1_s390.deb nessus-core (1.0.10-2.0.1) stable; urgency=low * Binary NMU to get rid of the libgmp3 library name using a rebuilt nessus-libraries package. stable/main/binary-powerpc/nessusd_1.0.10-2_powerpc.deb stable/main/binary-powerpc/nessus_1.0.10-2_powerpc.deb nessus-core (1.0.10-2) unstable; urgency=low * Moved to main. The only component of Nessus that needed non-US was an encryption layer library within the libnessus package. stable/main/binary-sparc/murasaki_0.5.4-2.1_sparc.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-s390/murasaki_0.5.4-2.1_s390.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-powerpc/murasaki_0.5.4-2.1_powerpc.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-mipsel/murasaki_0.5.4-2.1_mipsel.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-mips/murasaki_0.5.4-2.1_mips.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-m68k/murasaki_0.5.4-2.1_m68k.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-ia64/murasaki_0.5.4-2.1_ia64.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-hppa/murasaki_0.5.4-2.1_hppa.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-arm/murasaki_0.5.4-2.1_arm.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-alpha/murasaki_0.5.4-2.1_alpha.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/source/murasaki_0.5.4-2.1.diff.gz stable/main/binary-i386/murasaki_0.5.4-2.1_i386.deb stable/main/source/murasaki_0.5.4-2.1.dsc murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-sparc/muddleftpd_1.3.11-7woody2_sparc.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-s390/muddleftpd_1.3.11-7woody2_s390.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-powerpc/muddleftpd_1.3.11-7woody2_powerpc.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-mipsel/muddleftpd_1.3.11-7woody2_mipsel.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-mips/muddleftpd_1.3.11-7woody2_mips.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-m68k/muddleftpd_1.3.11-7woody2_m68k.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-ia64/muddleftpd_1.3.11-7woody2_ia64.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-hppa/muddleftpd_1.3.11-7woody2_hppa.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-arm/muddleftpd_1.3.11-7woody2_arm.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-alpha/muddleftpd_1.3.11-7woody2_alpha.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/source/muddleftpd_1.3.11-7woody2.diff.gz stable/main/source/muddleftpd_1.3.11-7woody2.dsc stable/main/binary-i386/muddleftpd_1.3.11-7woody2_i386.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/contrib/source/msttcorefonts_1.0.2.tar.gz stable/contrib/binary-all/msttcorefonts_1.0.2_all.deb stable/contrib/source/msttcorefonts_1.0.2.dsc msttcorefonts (1.0.2) stable; urgency=low * change base URL, Closes: #165926 stable/main/binary-s390/mpqc_2.0.4-1.1_s390.deb stable/main/binary-s390/libsc2_2.0.4-1.1_s390.deb stable/main/binary-s390/libsc-dev_2.0.4-1.1_s390.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-powerpc/mpqc_2.0.4-1.1_powerpc.deb stable/main/binary-powerpc/libsc2_2.0.4-1.1_powerpc.deb stable/main/binary-powerpc/libsc-dev_2.0.4-1.1_powerpc.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-m68k/libsc-dev_2.0.4-1.1_m68k.deb stable/main/binary-m68k/mpqc_2.0.4-1.1_m68k.deb stable/main/binary-m68k/libsc2_2.0.4-1.1_m68k.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-ia64/libsc-dev_2.0.4-1.1_ia64.deb stable/main/binary-ia64/mpqc_2.0.4-1.1_ia64.deb stable/main/binary-ia64/libsc2_2.0.4-1.1_ia64.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-i386/libsc2_2.0.4-1.1_i386.deb stable/main/binary-i386/libsc-dev_2.0.4-1.1_i386.deb stable/main/binary-i386/mpqc_2.0.4-1.1_i386.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-hppa/libsc2_2.0.4-1.1_hppa.deb stable/main/binary-hppa/libsc-dev_2.0.4-1.1_hppa.deb stable/main/binary-hppa/mpqc_2.0.4-1.1_hppa.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-sparc/libsc2_2.0.4-1.1_sparc.deb stable/main/binary-sparc/libsc-dev_2.0.4-1.1_sparc.deb stable/main/source/mpqc_2.0.4-1.1.diff.gz stable/main/binary-all/libsc-doc_2.0.4-1.1_all.deb stable/main/binary-sparc/mpqc_2.0.4-1.1_sparc.deb stable/main/source/mpqc_2.0.4-1.1.dsc mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-sparc/mpack_1.5-7woody2_sparc.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-s390/mpack_1.5-7woody2_s390.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-powerpc/mpack_1.5-7woody2_powerpc.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-mipsel/mpack_1.5-7woody2_mipsel.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-mips/mpack_1.5-7woody2_mips.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-ia64/mpack_1.5-7woody2_ia64.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-i386/mpack_1.5-7woody2_i386.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-hppa/mpack_1.5-7woody2_hppa.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-arm/mpack_1.5-7woody2_arm.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-alpha/mpack_1.5-7woody2_alpha.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/source/mpack_1.5-7woody2.diff.gz stable/main/source/mpack_1.5-7woody2.dsc stable/main/binary-m68k/mpack_1.5-7woody2_m68k.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-s390/libmm11-dev_1.1.3-6.1_s390.deb stable/main/binary-s390/libmm11_1.1.3-6.1_s390.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-powerpc/libmm11_1.1.3-6.1_powerpc.deb stable/main/binary-powerpc/libmm11-dev_1.1.3-6.1_powerpc.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-mipsel/libmm11-dev_1.1.3-6.1_mipsel.deb stable/main/binary-mipsel/libmm11_1.1.3-6.1_mipsel.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-mips/libmm11-dev_1.1.3-6.1_mips.deb stable/main/binary-mips/libmm11_1.1.3-6.1_mips.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-m68k/libmm11_1.1.3-6.1_m68k.deb stable/main/binary-m68k/libmm11-dev_1.1.3-6.1_m68k.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-ia64/libmm11-dev_1.1.3-6.1_ia64.deb stable/main/binary-ia64/libmm11_1.1.3-6.1_ia64.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-i386/libmm11_1.1.3-6.1_i386.deb stable/main/binary-i386/libmm11-dev_1.1.3-6.1_i386.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-hppa/libmm11-dev_1.1.3-6.1_hppa.deb stable/main/binary-hppa/libmm11_1.1.3-6.1_hppa.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-arm/libmm11-dev_1.1.3-6.1_arm.deb stable/main/binary-arm/libmm11_1.1.3-6.1_arm.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-alpha/libmm11-dev_1.1.3-6.1_alpha.deb stable/main/binary-alpha/libmm11_1.1.3-6.1_alpha.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/source/mm_1.1.3-6.1.dsc stable/main/binary-sparc/libmm11-dev_1.1.3-6.1_sparc.deb stable/main/binary-sparc/libmm11_1.1.3-6.1_sparc.deb stable/main/source/mm_1.1.3-6.1.diff.gz mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/source/mhonarc_2.5.2-1.2.diff.gz stable/main/source/mhonarc_2.5.2-1.2.dsc stable/main/binary-all/mhonarc_2.5.2-1.2_all.deb mhonarc (2.5.2-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Make sure to htmlize name parameter to avoid any potential XSS. (upstream) * XSS vulnerability with message header fields fixed: Message header field names were not escaped during conversion to HTML. Hence, an attacker could including scripting markup in the message header. (upstream) stable/main/binary-s390/masqmail_0.1.16-2.1_s390.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-powerpc/masqmail_0.1.16-2.1_powerpc.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-mipsel/masqmail_0.1.16-2.1_mipsel.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-mips/masqmail_0.1.16-2.1_mips.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-m68k/masqmail_0.1.16-2.1_m68k.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-ia64/masqmail_0.1.16-2.1_ia64.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-i386/masqmail_0.1.16-2.1_i386.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-hppa/masqmail_0.1.16-2.1_hppa.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-arm/masqmail_0.1.16-2.1_arm.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-alpha/masqmail_0.1.16-2.1_alpha.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/source/masqmail_0.1.16-2.1.diff.gz stable/main/binary-sparc/masqmail_0.1.16-2.1_sparc.deb stable/main/source/masqmail_0.1.16-2.1.dsc masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-all/mantis_0.17.1-2.5_all.deb stable/main/source/mantis_0.17.1-2.5.diff.gz stable/main/source/mantis_0.17.1-2.5.dsc mantis (0.17.1-2.5) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream changes to fix privilege escalation with private bugs (Mantis Advisory/2002-06) * Applied upstream changes to privilege escalation when no projects are accessable to the user (Mantis Advisory/2002-07) * Applied upstream fixes to fix the problem that Mantis ignores settings here and there (Mantis Advisory/2002-08) * Removed whitespace at the end of core_user_API.php (closes: Bug#159369) * Modified patches and files so dpkg-source doesn't complain about missing newlines anymore, gnarf. stable/main/binary-s390/mailman_2.0.11-1woody5_s390.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-powerpc/mailman_2.0.11-1woody5_powerpc.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-mipsel/mailman_2.0.11-1woody5_mipsel.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-mips/mailman_2.0.11-1woody5_mips.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-m68k/mailman_2.0.11-1woody5_m68k.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-ia64/mailman_2.0.11-1woody5_ia64.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-i386/mailman_2.0.11-1woody5_i386.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-hppa/mailman_2.0.11-1woody5_hppa.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-arm/mailman_2.0.11-1woody5_arm.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-alpha/mailman_2.0.11-1woody5_alpha.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/source/mailman_2.0.11-1woody5.dsc stable/main/source/mailman_2.0.11-1woody5.diff.gz stable/main/binary-sparc/mailman_2.0.11-1woody5_sparc.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/source/luxman_0.41-17.1.diff.gz stable/main/binary-i386/luxman_0.41-17.1_i386.deb stable/main/source/luxman_0.41-17.1.dsc luxman (0.41-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Use the full path for gzip to fix local root exploit in maped. Thanks to iDEFENSE for reporting this. stable/main/binary-sparc/logtool_1.0.6-7.woody.1_sparc.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-s390/logtool_1.0.6-7.woody.1_s390.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-powerpc/logtool_1.0.6-7.woody.1_powerpc.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-mipsel/logtool_1.0.6-7.woody.1_mipsel.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-mips/logtool_1.0.6-7.woody.1_mips.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-m68k/logtool_1.0.6-7.woody.1_m68k.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-ia64/logtool_1.0.6-7.woody.1_ia64.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-hppa/logtool_1.0.6-7.woody.1_hppa.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-arm/logtool_1.0.6-7.woody.1_arm.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-alpha/logtool_1.0.6-7.woody.1_alpha.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-i386/logtool_1.0.6-7.woody.1_i386.deb stable/main/source/logtool_1.0.6-7.woody.1.dsc stable/main/source/logtool_1.0.6-7.woody.1.diff.gz logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-s390/log2mail_0.2.5.1_s390.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-powerpc/log2mail_0.2.5.1_powerpc.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-mipsel/log2mail_0.2.5.1_mipsel.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-mips/log2mail_0.2.5.1_mips.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-m68k/log2mail_0.2.5.1_m68k.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-ia64/log2mail_0.2.5.1_ia64.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-i386/log2mail_0.2.5.1_i386.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-hppa/log2mail_0.2.5.1_hppa.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-arm/log2mail_0.2.5.1_arm.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-alpha/log2mail_0.2.5.1_alpha.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-sparc/log2mail_0.2.5.1_sparc.deb stable/main/source/log2mail_0.2.5.1.dsc stable/main/source/log2mail_0.2.5.1.tar.gz log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-sparc/libquota-perl_1.4.1-2_sparc.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-s390/libquota-perl_1.4.1-2_s390.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-powerpc/libquota-perl_1.4.1-2_powerpc.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-mipsel/libquota-perl_1.4.1-2_mipsel.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-mips/libquota-perl_1.4.1-2_mips.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-m68k/libquota-perl_1.4.1-2_m68k.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-ia64/libquota-perl_1.4.1-2_ia64.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-hppa/libquota-perl_1.4.1-2_hppa.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-arm/libquota-perl_1.4.1-2_arm.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-alpha/libquota-perl_1.4.1-2_alpha.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/source/libquota-perl_1.4.1-2.dsc stable/main/source/libquota-perl_1.4.1-2.diff.gz stable/main/binary-i386/libquota-perl_1.4.1-2_i386.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.2_s390.deb stable/main/binary-s390/libpng2_1.0.12-3.woody.2_s390.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.2_powerpc.deb stable/main/binary-powerpc/libpng2_1.0.12-3.woody.2_powerpc.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.2_mipsel.deb stable/main/binary-mipsel/libpng2_1.0.12-3.woody.2_mipsel.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.2_mips.deb stable/main/binary-mips/libpng2_1.0.12-3.woody.2_mips.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-m68k/libpng2_1.0.12-3.woody.2_m68k.deb stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.2_m68k.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.2_ia64.deb stable/main/binary-ia64/libpng2_1.0.12-3.woody.2_ia64.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-i386/libpng2_1.0.12-3.woody.2_i386.deb stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.2_i386.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.2_hppa.deb stable/main/binary-hppa/libpng2_1.0.12-3.woody.2_hppa.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-arm/libpng2_1.0.12-3.woody.2_arm.deb stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.2_arm.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-alpha/libpng2_1.0.12-3.woody.2_alpha.deb stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.2_alpha.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/source/libpng_1.0.12-3.woody.2.diff.gz stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.2_sparc.deb stable/main/binary-sparc/libpng2_1.0.12-3.woody.2_sparc.deb stable/main/source/libpng_1.0.12-3.woody.2.dsc libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-all/libgnupg-perl_0.9-1.woody.1_all.deb stable/main/source/libgnupg-perl_0.9-1.woody.1.diff.gz stable/main/source/libgnupg-perl_0.9-1.woody.1.dsc libgnupg-perl (0.9-1.woody.1) stable; urgency=low * Upload to stable (for woody r1). * Moved from non-US to main (Section: interpreters). (apart from the changelog this package is identical to 0.9-2) stable/main/binary-sparc/libgd-dev_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd1_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody2_sparc.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd1_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd-dev_1.8.4-17.woody2_s390.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-powerpc/libgd1_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody2_powerpc.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd1_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody2_mipsel.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd1_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd-dev_1.8.4-17.woody2_mips.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-m68k/libgd1_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd-dev_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody2_m68k.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd1_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd-dev_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody2_ia64.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-hppa/libgd1_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd-dev_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody2_hppa.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd1_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd-dev_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody2_arm.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-alpha/libgd1_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd-dev_1.8.4-17.woody2_alpha.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-i386/libgd-dev_1.8.4-17.woody2_i386.deb stable/main/source/libgd_1.8.4-17.woody2.dsc stable/main/binary-i386/libgd1_1.8.4-17.woody2_i386.deb stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody2_i386.deb stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody2_i386.deb stable/main/source/libgd_1.8.4-17.woody2.diff.gz libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-sparc/l2tpd_0.67-1.1_sparc.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-s390/l2tpd_0.67-1.1_s390.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-powerpc/l2tpd_0.67-1.1_powerpc.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-mipsel/l2tpd_0.67-1.1_mipsel.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-mips/l2tpd_0.67-1.1_mips.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-ia64/l2tpd_0.67-1.1_ia64.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-i386/l2tpd_0.67-1.1_i386.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-hppa/l2tpd_0.67-1.1_hppa.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-arm/l2tpd_0.67-1.1_arm.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-alpha/l2tpd_0.67-1.1_alpha.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/source/l2tpd_0.67-1.1.dsc stable/main/binary-m68k/l2tpd_0.67-1.1_m68k.deb stable/main/source/l2tpd_0.67-1.1.diff.gz l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkadm55_1.2.4-5woody3_sparc.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-s390/libkrb5-dev_1.2.4-5woody3_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody3_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-admin-server_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-kdc_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody3_s390.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkrb53_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkadm55_1.2.4-5woody3_powerpc.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-mipsel/libkadm55_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/libkrb53_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody3_mipsel.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-mips/libkrb53_1.2.4-5woody3_mips.deb stable/main/binary-mips/libkadm55_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody3_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody3_mips.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-m68k/krb5-user_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-kdc_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody3_m68k.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-ia64/libkadm55_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/libkrb53_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody3_ia64.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-hppa/libkrb53_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/libkadm55_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-kdc_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody3_hppa.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-arm/krb5-telnetd_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-user_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-kdc_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-admin-server_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody3_arm.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-user_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody3_alpha.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-i386/krb5-clients_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody3_i386.deb stable/main/binary-all/krb5-doc_1.2.4-5woody3_all.deb stable/main/source/krb5_1.2.4-5woody3.dsc stable/main/binary-i386/krb5-ftpd_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkrb5-dev_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkrb53_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody3_i386.deb stable/main/source/krb5_1.2.4-5woody3.diff.gz stable/main/binary-i386/krb5-telnetd_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody3_i386.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/source/kernel-source-2.2.22_2.2.22-1.diff.gz stable/main/source/kernel-source-2.2.22_2.2.22.orig.tar.gz stable/main/binary-all/kernel-source-2.2.22_2.2.22-1_all.deb stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1_all.deb stable/main/source/kernel-source-2.2.22_2.2.22-1.dsc kernel-source-2.2.22 (2.2.22-1) stable unstable; urgency=low * New upstream release. * Disabled MCE on Pentiums by default (closes: #154589). stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody0_mips.deb stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody0_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.dsc stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0_all.deb stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody0_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.tar.gz stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody0_mips.deb kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody0) stable; urgency=low * actually 2.4.19-0.020911.2 recompiled for woody (rediffed against kernel-source-2.4.19-4) stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.diff.gz stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1_all.deb stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.dsc kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1) stable; urgency=high * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.06.12). This patch fixes the DASD deadlock problem and some other severe problems. * Removed NMU DASD deadlock fix. * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.08.16). This patch fixes a problem related to the IUCV driver. stable/main/binary-all/kernel-headers-2.4.19-sparc_26_all.deb stable/main/source/kernel-image-sparc-2.4_26.tar.gz stable/main/binary-sparc/kernel-image-2.4.19-sun4u_26_sparc.deb stable/main/source/kernel-image-sparc-2.4_26.dsc stable/main/binary-sparc/kernel-image-2.4.19-sun4u-smp_26_sparc.deb kernel-image-sparc-2.4 (26) stable; urgency=low * More patches from davem, to fix serious bugs. * Strip kernel image so it fits better (makes SILO and TILO happy) stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.1.1_s390.deb stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1_s390.deb stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.dsc stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.tar.gz kernel-image-2.4.17-s390 (2.4.17-2.woody.1.1) stable; urgency=high * NMU * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.06.12). This patch fixes the DASD deadlock problem and some other severe problems. * Removed NMU DASD deadlock fix. * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.08.16). This patch fixes a problem related to the IUCV driver. stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-1_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-1_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.dsc stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-1_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.tar.gz stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-1_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-1_alpha.deb kernel-image-2.2.22-alpha (2.2.22-1) stable unstable; urgency=low * New upstream release. stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-s390/libarts_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.5_s390.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libkmid_2.2.2-13.woody.5_powerpc.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.5_mips.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-m68k/libkmid_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.5_m68k.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.5_ia64.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-i386/libarts_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid_2.2.2-13.woody.5_i386.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.5_hppa.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libarts_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.5_arm.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.5_alpha.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/source/kdelibs_2.2.2-13.woody.5.diff.gz stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.5_mipsel.deb stable/main/source/kdelibs_2.2.2-13.woody.5.dsc stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.5_all.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.5_mipsel.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-s390/kamera_2.2.2-6.8_s390.deb stable/main/binary-s390/kcoloredit_2.2.2-6.8_s390.deb stable/main/binary-s390/libkscan-dev_2.2.2-6.8_s390.deb stable/main/binary-s390/kruler_2.2.2-6.8_s390.deb stable/main/binary-s390/kghostview_2.2.2-6.8_s390.deb stable/main/binary-s390/kpaint_2.2.2-6.8_s390.deb stable/main/binary-s390/kooka_2.2.2-6.8_s390.deb stable/main/binary-s390/libkscan1_2.2.2-6.8_s390.deb stable/main/binary-s390/ksnapshot_2.2.2-6.8_s390.deb stable/main/binary-s390/kiconedit_2.2.2-6.8_s390.deb stable/main/binary-s390/kfract_2.2.2-6.8_s390.deb stable/main/binary-s390/kview_2.2.2-6.8_s390.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-powerpc/kruler_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/libkscan1_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kamera_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kiconedit_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kghostview_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/ksnapshot_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/libkscan-dev_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kpaint_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kview_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kfract_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kcoloredit_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kooka_2.2.2-6.8_powerpc.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-mipsel/kamera_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kfract_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kiconedit_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kruler_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/libkscan1_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kcoloredit_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kooka_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kpaint_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kghostview_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/ksnapshot_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kview_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/libkscan-dev_2.2.2-6.8_mipsel.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk M|ller of KDE. stable/main/binary-mips/kamera_2.2.2-6.8_mips.deb stable/main/binary-mips/libkscan-dev_2.2.2-6.8_mips.deb stable/main/binary-mips/kghostview_2.2.2-6.8_mips.deb stable/main/binary-mips/kcoloredit_2.2.2-6.8_mips.deb stable/main/binary-mips/kpaint_2.2.2-6.8_mips.deb stable/main/binary-mips/kooka_2.2.2-6.8_mips.deb stable/main/binary-mips/ksnapshot_2.2.2-6.8_mips.deb stable/main/binary-mips/kfract_2.2.2-6.8_mips.deb stable/main/binary-mips/kiconedit_2.2.2-6.8_mips.deb stable/main/binary-mips/kruler_2.2.2-6.8_mips.deb stable/main/binary-mips/libkscan1_2.2.2-6.8_mips.deb stable/main/binary-mips/kview_2.2.2-6.8_mips.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-m68k/kcoloredit_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kview_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kamera_2.2.2-6.8_m68k.deb stable/main/binary-m68k/libkscan-dev_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kghostview_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kruler_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kfract_2.2.2-6.8_m68k.deb stable/main/binary-m68k/ksnapshot_2.2.2-6.8_m68k.deb stable/main/binary-m68k/libkscan1_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kooka_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kpaint_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kiconedit_2.2.2-6.8_m68k.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-ia64/kooka_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kpaint_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kcoloredit_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kiconedit_2.2.2-6.8_ia64.deb stable/main/binary-ia64/libkscan-dev_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kghostview_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kamera_2.2.2-6.8_ia64.deb stable/main/binary-ia64/libkscan1_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kruler_2.2.2-6.8_ia64.deb stable/main/binary-ia64/ksnapshot_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kview_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kfract_2.2.2-6.8_ia64.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-i386/kiconedit_2.2.2-6.8_i386.deb stable/main/binary-i386/kfract_2.2.2-6.8_i386.deb stable/main/binary-i386/libkscan1_2.2.2-6.8_i386.deb stable/main/binary-i386/kooka_2.2.2-6.8_i386.deb stable/main/binary-i386/kpaint_2.2.2-6.8_i386.deb stable/main/binary-i386/kghostview_2.2.2-6.8_i386.deb stable/main/binary-i386/libkscan-dev_2.2.2-6.8_i386.deb stable/main/binary-i386/ksnapshot_2.2.2-6.8_i386.deb stable/main/binary-i386/kruler_2.2.2-6.8_i386.deb stable/main/binary-i386/kcoloredit_2.2.2-6.8_i386.deb stable/main/binary-i386/kview_2.2.2-6.8_i386.deb stable/main/binary-i386/kamera_2.2.2-6.8_i386.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-hppa/kfract_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kamera_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kcoloredit_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kpaint_2.2.2-6.8_hppa.deb stable/main/binary-hppa/ksnapshot_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kghostview_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kview_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kruler_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kiconedit_2.2.2-6.8_hppa.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-arm/kooka_2.2.2-6.8_arm.deb stable/main/binary-arm/libkscan1_2.2.2-6.8_arm.deb stable/main/binary-arm/ksnapshot_2.2.2-6.8_arm.deb stable/main/binary-arm/kpaint_2.2.2-6.8_arm.deb stable/main/binary-arm/kghostview_2.2.2-6.8_arm.deb stable/main/binary-arm/kcoloredit_2.2.2-6.8_arm.deb stable/main/binary-arm/kiconedit_2.2.2-6.8_arm.deb stable/main/binary-arm/kruler_2.2.2-6.8_arm.deb stable/main/binary-arm/libkscan-dev_2.2.2-6.8_arm.deb stable/main/binary-arm/kfract_2.2.2-6.8_arm.deb stable/main/binary-arm/kview_2.2.2-6.8_arm.deb stable/main/binary-arm/kamera_2.2.2-6.8_arm.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-alpha/kview_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kamera_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kghostview_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kruler_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kiconedit_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kooka_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kpaint_2.2.2-6.8_alpha.deb stable/main/binary-alpha/ksnapshot_2.2.2-6.8_alpha.deb stable/main/binary-alpha/libkscan-dev_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kcoloredit_2.2.2-6.8_alpha.deb stable/main/binary-alpha/libkscan1_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kfract_2.2.2-6.8_alpha.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-sparc/libkscan-dev_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kfract_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kview_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kiconedit_2.2.2-6.8_sparc.deb stable/main/binary-sparc/ksnapshot_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kamera_2.2.2-6.8_sparc.deb stable/main/source/kdegraphics_2.2.2-6.8.dsc stable/main/binary-sparc/kcoloredit_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kruler_2.2.2-6.8_sparc.deb stable/main/source/kdegraphics_2.2.2-6.8.diff.gz stable/main/binary-sparc/kghostview_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kpaint_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kooka_2.2.2-6.8_sparc.deb stable/main/binary-sparc/libkscan1_2.2.2-6.8_sparc.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-s390/irssi-text_0.8.4-3.1_s390.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-powerpc/irssi-text_0.8.4-3.1_powerpc.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-mipsel/irssi-text_0.8.4-3.1_mipsel.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-mips/irssi-text_0.8.4-3.1_mips.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-m68k/irssi-text_0.8.4-3.1_m68k.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-ia64/irssi-text_0.8.4-3.1_ia64.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-i386/irssi-text_0.8.4-3.1_i386.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-hppa/irssi-text_0.8.4-3.1_hppa.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-arm/irssi-text_0.8.4-3.1_arm.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-alpha/irssi-text_0.8.4-3.1_alpha.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/source/irssi-text_0.8.4-3.1.diff.gz stable/main/binary-sparc/irssi-text_0.8.4-3.1_sparc.deb stable/main/source/irssi-text_0.8.4-3.1.dsc irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.1_sparc.deb stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_sparc.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.1_s390.deb stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.1_s390.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.1_powerpc.deb stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.1_mipsel.deb stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.1_mips.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.1_m68k.deb stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.1_ia64.deb stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.1_hppa.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.1_arm.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.1_alpha.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/source/interchange_4.8.3.20020306-1.woody.1.dsc stable/main/source/interchange_4.8.3.20020306-1.woody.1.diff.gz stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.1_all.deb stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.1_i386.deb stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-all/initrd-tools_0.1.32woody.3_all.deb stable/main/source/initrd-tools_0.1.32woody.3.dsc stable/main/source/initrd-tools_0.1.32woody.3.tar.gz initrd-tools (0.1.32woody.3) stable; urgency=low * Depend on debhelper >= 3 (closes: #171364). stable/main/source/im_141-18.2.dsc stable/main/binary-all/im_141-18.2_all.deb stable/main/source/im_141-18.2.diff.gz im (1:141-18.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Fixed yafhci386 that turned out to be yafhc$build_arch stable/main/binary-s390/hylafax-server_4.1.1-1.1_s390.deb stable/main/binary-s390/hylafax-client_4.1.1-1.1_s390.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-powerpc/hylafax-server_4.1.1-1.1_powerpc.deb stable/main/binary-powerpc/hylafax-client_4.1.1-1.1_powerpc.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-m68k/hylafax-client_4.1.1-1.1_m68k.deb stable/main/binary-m68k/hylafax-server_4.1.1-1.1_m68k.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-ia64/hylafax-server_4.1.1-1.1_ia64.deb stable/main/binary-ia64/hylafax-client_4.1.1-1.1_ia64.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-i386/hylafax-server_4.1.1-1.1_i386.deb stable/main/binary-i386/hylafax-client_4.1.1-1.1_i386.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-hppa/hylafax-server_4.1.1-1.1_hppa.deb stable/main/binary-hppa/hylafax-client_4.1.1-1.1_hppa.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-arm/hylafax-client_4.1.1-1.1_arm.deb stable/main/binary-arm/hylafax-server_4.1.1-1.1_arm.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-alpha/hylafax-client_4.1.1-1.1_alpha.deb stable/main/binary-alpha/hylafax-server_4.1.1-1.1_alpha.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-all/hylafax-doc_4.1.1-1.1_all.deb stable/main/source/hylafax_4.1.1-1.1.diff.gz stable/main/source/hylafax_4.1.1-1.1.dsc stable/main/binary-sparc/hylafax-client_4.1.1-1.1_sparc.deb stable/main/binary-sparc/hylafax-server_4.1.1-1.1_sparc.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-hppa/htmldoc_1.8.17-2_hppa.deb htmldoc (1.8.17-2) woody-proposed-updates; urgency=high * Fixed bug in configure.in; --without-openssl-* wasn't recognized. Considered high priority because the previous version of htmldoc is linked against OpenSSL because of this bug, which is a violation of the GPL. stable/main/binary-all/html2ps_1.0b3-1.2_all.deb stable/main/source/html2ps_1.0b3-1.2.dsc stable/main/source/html2ps_1.0b3-1.2.diff.gz html2ps (1.0b3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a trivial syntax error introduced in 1.0b3-1.1 (Closes: #170272) stable/main/binary-s390/htcheck_1.1-1.1_s390.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-powerpc/htcheck_1.1-1.1_powerpc.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-mipsel/htcheck_1.1-1.1_mipsel.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-mips/htcheck_1.1-1.1_mips.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-m68k/htcheck_1.1-1.1_m68k.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-ia64/htcheck_1.1-1.1_ia64.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-i386/htcheck_1.1-1.1_i386.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-hppa/htcheck_1.1-1.1_hppa.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-arm/htcheck_1.1-1.1_arm.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-alpha/htcheck_1.1-1.1_alpha.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-sparc/htcheck_1.1-1.1_sparc.deb stable/main/source/htcheck_1.1-1.1.dsc stable/main/source/htcheck_1.1-1.1.diff.gz stable/main/binary-all/htcheck-php_1.1-1.1_all.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-s390/libstonith0_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/libstonith-dev_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/heartbeat_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/stonith_0.4.9.0l-7.2_s390.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-powerpc/stonith_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/libstonith-dev_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/heartbeat_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/libstonith0_0.4.9.0l-7.2_powerpc.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-mipsel/libstonith-dev_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/heartbeat_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/libstonith0_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/stonith_0.4.9.0l-7.2_mipsel.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-mips/libstonith0_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/stonith_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/heartbeat_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/libstonith-dev_0.4.9.0l-7.2_mips.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-m68k/heartbeat_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/stonith_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/libstonith0_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/libstonith-dev_0.4.9.0l-7.2_m68k.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-ia64/stonith_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/libstonith0_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/heartbeat_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/libstonith-dev_0.4.9.0l-7.2_ia64.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-i386/libstonith-dev_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/heartbeat_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/stonith_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/libstonith0_0.4.9.0l-7.2_i386.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-hppa/libstonith0_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/stonith_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/heartbeat_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/libstonith-dev_0.4.9.0l-7.2_hppa.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-arm/libstonith0_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/heartbeat_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/stonith_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/libstonith-dev_0.4.9.0l-7.2_arm.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-alpha/libstonith-dev_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/libstonith0_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/stonith_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/heartbeat_0.4.9.0l-7.2_alpha.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-sparc/heartbeat_0.4.9.0l-7.2_sparc.deb stable/main/binary-all/ldirectord_0.4.9.0l-7.2_all.deb stable/main/binary-sparc/stonith_0.4.9.0l-7.2_sparc.deb stable/main/source/heartbeat_0.4.9.0l-7.2.diff.gz stable/main/binary-sparc/libstonith0_0.4.9.0l-7.2_sparc.deb stable/main/binary-sparc/libstonith-dev_0.4.9.0l-7.2_sparc.deb stable/main/source/heartbeat_0.4.9.0l-7.2.dsc heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-s390/gv_3.5.8-26.1_s390.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-powerpc/gv_3.5.8-26.1_powerpc.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-mipsel/gv_3.5.8-26.1_mipsel.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-mips/gv_3.5.8-26.1_mips.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-m68k/gv_3.5.8-26.1_m68k.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-ia64/gv_3.5.8-26.1_ia64.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-i386/gv_3.5.8-26.1_i386.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-hppa/gv_3.5.8-26.1_hppa.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-arm/gv_3.5.8-26.1_arm.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-alpha/gv_3.5.8-26.1_alpha.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/source/gv_3.5.8-26.1.diff.gz stable/main/binary-sparc/gv_3.5.8-26.1_sparc.deb stable/main/source/gv_3.5.8-26.1.dsc gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-sparc/gtetrinet_0.4.1-9woody1.1_sparc.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-s390/gtetrinet_0.4.1-9woody1.1_s390.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-powerpc/gtetrinet_0.4.1-9woody1.1_powerpc.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-mipsel/gtetrinet_0.4.1-9woody1.1_mipsel.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-mips/gtetrinet_0.4.1-9woody1.1_mips.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-m68k/gtetrinet_0.4.1-9woody1.1_m68k.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-ia64/gtetrinet_0.4.1-9woody1.1_ia64.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-hppa/gtetrinet_0.4.1-9woody1.1_hppa.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-arm/gtetrinet_0.4.1-9woody1.1_arm.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-alpha/gtetrinet_0.4.1-9woody1.1_alpha.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/source/gtetrinet_0.4.1-9woody1.1.dsc stable/main/binary-i386/gtetrinet_0.4.1-9woody1.1_i386.deb stable/main/source/gtetrinet_0.4.1-9woody1.1.diff.gz gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends gtetrinet (0.4.1-9woody1) stable-security; urgency=HIGH * Apply patch from James Antill to fix multiple buffer overflows (Buqtraq ID: 6062). stable/main/binary-sparc/gnome-pim-conduits_1.4.6-1woody1_sparc.deb stable/main/binary-sparc/gnome-pim_1.4.6-1woody1_sparc.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-s390/gnome-pim-conduits_1.4.6-1woody1_s390.deb stable/main/binary-s390/gnome-pim_1.4.6-1woody1_s390.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-powerpc/gnome-pim_1.4.6-1woody1_powerpc.deb stable/main/binary-powerpc/gnome-pim-conduits_1.4.6-1woody1_powerpc.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-mipsel/gnome-pim-conduits_1.4.6-1woody1_mipsel.deb stable/main/binary-mipsel/gnome-pim_1.4.6-1woody1_mipsel.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-mips/gnome-pim-conduits_1.4.6-1woody1_mips.deb stable/main/binary-mips/gnome-pim_1.4.6-1woody1_mips.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-m68k/gnome-pim_1.4.6-1woody1_m68k.deb stable/main/binary-m68k/gnome-pim-conduits_1.4.6-1woody1_m68k.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-ia64/gnome-pim-conduits_1.4.6-1woody1_ia64.deb stable/main/binary-ia64/gnome-pim_1.4.6-1woody1_ia64.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-hppa/gnome-pim-conduits_1.4.6-1woody1_hppa.deb stable/main/binary-hppa/gnome-pim_1.4.6-1woody1_hppa.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-arm/gnome-pim_1.4.6-1woody1_arm.deb stable/main/binary-arm/gnome-pim-conduits_1.4.6-1woody1_arm.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-alpha/gnome-pim_1.4.6-1woody1_alpha.deb stable/main/binary-alpha/gnome-pim-conduits_1.4.6-1woody1_alpha.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-i386/gnome-pim_1.4.6-1woody1_i386.deb stable/main/source/gnome-pim_1.4.6-1woody1.diff.gz stable/main/source/gnome-pim_1.4.6-1woody1.dsc stable/main/binary-i386/gnome-pim-conduits_1.4.6-1woody1_i386.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-s390/gnome-gv_1.1.96-3.1_s390.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-powerpc/gnome-gv_1.1.96-3.1_powerpc.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-mipsel/gnome-gv_1.1.96-3.1_mipsel.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-mips/gnome-gv_1.1.96-3.1_mips.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-m68k/gnome-gv_1.1.96-3.1_m68k.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-ia64/gnome-gv_1.1.96-3.1_ia64.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-i386/gnome-gv_1.1.96-3.1_i386.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-hppa/gnome-gv_1.1.96-3.1_hppa.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-arm/gnome-gv_1.1.96-3.1_arm.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-alpha/gnome-gv_1.1.96-3.1_alpha.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/source/gnome-gv_1.1.96-3.1.diff.gz stable/main/binary-sparc/gnome-gv_1.1.96-3.1_sparc.deb stable/main/source/gnome-gv_1.1.96-3.1.dsc gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-sparc/libc6-prof_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-pic_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dbg_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.2_sparc.deb stable/main/binary-sparc/nscd_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dev_2.2.5-11.2_sparc.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-s390/libc6-pic_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-dev_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-prof_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-dbg_2.2.5-11.2_s390.deb stable/main/binary-s390/nscd_2.2.5-11.2_s390.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-powerpc/libc6_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/nscd_2.2.5-11.2_powerpc.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-mipsel/libc6-prof_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/nscd_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.2.5-11.2_mipsel.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-mips/libc6-dev_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-prof_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-dbg_2.2.5-11.2_mips.deb stable/main/binary-mips/nscd_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-pic_2.2.5-11.2_mips.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-ia64/libc6.1_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.2.5-11.2_ia64.deb stable/main/binary-ia64/nscd_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.2_ia64.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-i386/libc6-prof_2.2.5-11.2_i386.deb stable/main/binary-i386/nscd_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-dev_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-pic_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-dbg_2.2.5-11.2_i386.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-hppa/libc6-dev_2.2.5-11.2_hppa.deb stable/main/binary-hppa/nscd_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-dbg_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-prof_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-pic_2.2.5-11.2_hppa.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-arm/libc6-prof_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-dbg_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-pic_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-dev_2.2.5-11.2_arm.deb stable/main/binary-arm/nscd_2.2.5-11.2_arm.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-alpha/nscd_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.2.5-11.2_alpha.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-all/locales_2.2.5-11.2_all.deb stable/main/binary-m68k/libc6-dbg_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6-prof_2.2.5-11.2_m68k.deb stable/main/binary-all/glibc-doc_2.2.5-11.2_all.deb stable/main/binary-m68k/libc6-dev_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6-pic_2.2.5-11.2_m68k.deb stable/main/binary-m68k/nscd_2.2.5-11.2_m68k.deb stable/main/source/glibc_2.2.5-11.2.dsc stable/main/source/glibc_2.2.5-11.2.diff.gz glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-s390/g++-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/protoize-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gobjc-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-dbg_2.95.4-11woody1_s390.deb stable/main/binary-s390/cpp-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gcc-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-dev_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-glibc2.2_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-dev_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-dbg_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_s390.deb stable/main/binary-s390/chill-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/g77-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gpc-2.95_2.95.4-11woody1_s390.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-powerpc/libg++2.8.1.3-dbg_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gcc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-glibc2.2_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gpc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gobjc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gcc-2.95-nof_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-dev_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/chill-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/g++-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/cpp-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libg++2.8.1.3-dev_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/g77-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-dbg_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/protoize-2.95_2.95.4-11woody1_powerpc.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-m68k/chill-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-dev_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/protoize-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gobjc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/cpp-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-dbg_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gcc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gpc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-dbg_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-glibc2.2_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/g77-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-dev_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/g++-2.95_2.95.4-11woody1_m68k.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-arm/g77-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/gobjc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/chill-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/gcc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-dev_2.95.4-11woody1_arm.deb stable/main/binary-arm/cpp-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-dev_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-dbg_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-dbg_2.95.4-11woody1_arm.deb stable/main/binary-arm/gpc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/g++-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/protoize-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-glibc2.2_2.95.4-11woody1_arm.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-alpha/libstdc++2.10-dbg_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/g++-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gpc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libstdc++2.10-dev_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gobjc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libstdc++2.10-glibc2.2_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/cpp-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-dev_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gcc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-dbg_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/g77-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/protoize-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/chill-2.95_2.95.4-11woody1_alpha.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-i386/g77-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/gcc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/gpc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-all/gcc-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/protoize-2.95_2.95.4-11woody1_i386.deb stable/main/binary-all/cpp-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/gobjc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/libg++2.8.1.3-dev_2.95.4-11woody1_i386.deb stable/main/binary-i386/libstdc++2.10-dev_2.95.4-11woody1_i386.deb stable/main/binary-i386/cpp-2.95_2.95.4-11woody1_i386.deb stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.diff.gz stable/main/binary-all/gpc-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/libg++2.8.1.3-dbg_2.95.4-11woody1_i386.deb stable/main/binary-all/g77-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/libstdc++2.10-glibc2.2_2.95.4-11woody1_i386.deb stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.dsc stable/main/binary-i386/libstdc++2.10-dbg_2.95.4-11woody1_i386.deb stable/main/binary-i386/g++-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_i386.deb stable/main/binary-i386/chill-2.95_2.95.4-11woody1_i386.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/source/gallery_1.2.5-7.woody.0.diff.gz stable/main/source/gallery_1.2.5-7.woody.0.dsc stable/main/binary-all/gallery_1.2.5-7.woody.0_all.deb gallery (1.2.5-7.woody.0) stable-security; urgency=high * SECURITY: fix from upstream CVS to stop remote command execution through $GALLERY_BASEDIR var. stable/main/binary-s390/gaim-common_0.58-2.3_s390.deb stable/main/binary-s390/gaim_0.58-2.3_s390.deb stable/main/binary-s390/gaim-gnome_0.58-2.3_s390.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-powerpc/gaim_0.58-2.3_powerpc.deb stable/main/binary-powerpc/gaim-gnome_0.58-2.3_powerpc.deb stable/main/binary-powerpc/gaim-common_0.58-2.3_powerpc.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-mipsel/gaim-common_0.58-2.3_mipsel.deb stable/main/binary-mipsel/gaim_0.58-2.3_mipsel.deb stable/main/binary-mipsel/gaim-gnome_0.58-2.3_mipsel.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-mips/gaim_0.58-2.3_mips.deb stable/main/binary-mips/gaim-common_0.58-2.3_mips.deb stable/main/binary-mips/gaim-gnome_0.58-2.3_mips.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-m68k/gaim-common_0.58-2.3_m68k.deb stable/main/binary-m68k/gaim_0.58-2.3_m68k.deb stable/main/binary-m68k/gaim-gnome_0.58-2.3_m68k.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-ia64/gaim-gnome_0.58-2.3_ia64.deb stable/main/binary-ia64/gaim_0.58-2.3_ia64.deb stable/main/binary-ia64/gaim-common_0.58-2.3_ia64.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-i386/gaim-gnome_0.58-2.3_i386.deb stable/main/binary-i386/gaim-common_0.58-2.3_i386.deb stable/main/binary-i386/gaim_0.58-2.3_i386.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-hppa/gaim-gnome_0.58-2.3_hppa.deb stable/main/binary-hppa/gaim_0.58-2.3_hppa.deb stable/main/binary-hppa/gaim-common_0.58-2.3_hppa.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-arm/gaim-common_0.58-2.3_arm.deb stable/main/binary-arm/gaim-gnome_0.58-2.3_arm.deb stable/main/binary-arm/gaim_0.58-2.3_arm.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-alpha/gaim-common_0.58-2.3_alpha.deb stable/main/binary-alpha/gaim-gnome_0.58-2.3_alpha.deb stable/main/binary-alpha/gaim_0.58-2.3_alpha.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/source/gaim_0.58-2.3.diff.gz stable/main/binary-sparc/gaim-common_0.58-2.3_sparc.deb stable/main/binary-sparc/gaim_0.58-2.3_sparc.deb stable/main/source/gaim_0.58-2.3.dsc stable/main/binary-sparc/gaim-gnome_0.58-2.3_sparc.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-s390/fetchmail-ssl_5.9.11-6.1_s390.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.1_powerpc.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.1_mipsel.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mips/fetchmail-ssl_5.9.11-6.1_mips.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.1_m68k.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.1_ia64.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-i386/fetchmail-ssl_5.9.11-6.1_i386.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.1_hppa.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-arm/fetchmail-ssl_5.9.11-6.1_arm.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.1_alpha.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/source/fetchmail-ssl_5.9.11-6.1.dsc stable/main/source/fetchmail-ssl_5.9.11-6.1.diff.gz stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.1_sparc.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-s390/fetchmail_5.9.11-6.1_s390.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-powerpc/fetchmail_5.9.11-6.1_powerpc.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mipsel/fetchmail_5.9.11-6.1_mipsel.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mips/fetchmail_5.9.11-6.1_mips.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-m68k/fetchmail_5.9.11-6.1_m68k.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-ia64/fetchmail_5.9.11-6.1_ia64.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-i386/fetchmail_5.9.11-6.1_i386.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-hppa/fetchmail_5.9.11-6.1_hppa.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-arm/fetchmail_5.9.11-6.1_arm.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-alpha/fetchmail_5.9.11-6.1_alpha.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-all/fetchmailconf_5.9.11-6.1_all.deb stable/main/source/fetchmail_5.9.11-6.1.dsc stable/main/binary-sparc/fetchmail_5.9.11-6.1_sparc.deb stable/main/binary-all/fetchmail-common_5.9.11-6.1_all.deb stable/main/source/fetchmail_5.9.11-6.1.diff.gz fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-s390/fam_2.6.6.1-5.2_s390.deb stable/main/binary-s390/libfam-dev_2.6.6.1-5.2_s390.deb stable/main/binary-s390/libfam0_2.6.6.1-5.2_s390.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-powerpc/libfam-dev_2.6.6.1-5.2_powerpc.deb stable/main/binary-powerpc/fam_2.6.6.1-5.2_powerpc.deb stable/main/binary-powerpc/libfam0_2.6.6.1-5.2_powerpc.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-mipsel/fam_2.6.6.1-5.2_mipsel.deb stable/main/binary-mipsel/libfam-dev_2.6.6.1-5.2_mipsel.deb stable/main/binary-mipsel/libfam0_2.6.6.1-5.2_mipsel.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-mips/libfam-dev_2.6.6.1-5.2_mips.deb stable/main/binary-mips/libfam0_2.6.6.1-5.2_mips.deb stable/main/binary-mips/fam_2.6.6.1-5.2_mips.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-m68k/libfam0_2.6.6.1-5.2_m68k.deb stable/main/binary-m68k/libfam-dev_2.6.6.1-5.2_m68k.deb stable/main/binary-m68k/fam_2.6.6.1-5.2_m68k.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-ia64/fam_2.6.6.1-5.2_ia64.deb stable/main/binary-ia64/libfam0_2.6.6.1-5.2_ia64.deb stable/main/binary-ia64/libfam-dev_2.6.6.1-5.2_ia64.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-i386/fam_2.6.6.1-5.2_i386.deb stable/main/binary-i386/libfam0_2.6.6.1-5.2_i386.deb stable/main/binary-i386/libfam-dev_2.6.6.1-5.2_i386.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-hppa/libfam-dev_2.6.6.1-5.2_hppa.deb stable/main/binary-hppa/libfam0_2.6.6.1-5.2_hppa.deb stable/main/binary-hppa/fam_2.6.6.1-5.2_hppa.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-arm/fam_2.6.6.1-5.2_arm.deb stable/main/binary-arm/libfam0_2.6.6.1-5.2_arm.deb stable/main/binary-arm/libfam-dev_2.6.6.1-5.2_arm.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-alpha/libfam0_2.6.6.1-5.2_alpha.deb stable/main/binary-alpha/libfam-dev_2.6.6.1-5.2_alpha.deb stable/main/binary-alpha/fam_2.6.6.1-5.2_alpha.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-sparc/libfam-dev_2.6.6.1-5.2_sparc.deb stable/main/source/fam_2.6.6.1-5.2.diff.gz stable/main/binary-sparc/libfam0_2.6.6.1-5.2_sparc.deb stable/main/binary-sparc/fam_2.6.6.1-5.2_sparc.deb stable/main/source/fam_2.6.6.1-5.2.dsc fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-s390/ethereal-common_0.9.4-1woody2_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody2_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody2_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody2_s390.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-powerpc/ethereal_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody2_powerpc.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-mipsel/ethereal-common_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/tethereal_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody2_mipsel.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-mips/ethereal-dev_0.9.4-1woody2_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody2_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody2_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody2_mips.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-m68k/ethereal-dev_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/ethereal_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody2_m68k.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-ia64/tethereal_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody2_ia64.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-i386/ethereal_0.9.4-1woody2_i386.deb stable/main/binary-i386/ethereal-common_0.9.4-1woody2_i386.deb stable/main/binary-i386/tethereal_0.9.4-1woody2_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody2_i386.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-hppa/ethereal-common_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody2_hppa.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-arm/ethereal-common_0.9.4-1woody2_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody2_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody2_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody2_arm.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-alpha/ethereal-dev_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody2_alpha.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-sparc/ethereal_0.9.4-1woody2_sparc.deb stable/main/binary-sparc/ethereal-dev_0.9.4-1woody2_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody2_sparc.deb stable/main/source/ethereal_0.9.4-1woody2.dsc stable/main/binary-sparc/tethereal_0.9.4-1woody2_sparc.deb stable/main/source/ethereal_0.9.4-1woody2.diff.gz ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/source/eroaster_2.1.0.0.3-2.dsc stable/main/binary-all/eroaster_2.1.0.0.3-2_all.deb stable/main/source/eroaster_2.1.0.0.3-2.diff.gz eroaster (2.1.0.0.3-2) stable; urgency=low * Fixed a typo that broke image creation with mkisofs if only the image was being created, ie if not part of create image/burn operation (closes: #170277) stable/main/source/epic4-script-light_2.7.30p5-1.1.diff.gz stable/main/binary-all/epic4-script-light_2.7.30p5-1.1_all.deb stable/main/source/epic4-script-light_2.7.30p5-1.1.dsc epic4-script-light (1:2.7.30p5-1.1) stable-security; urgency=high * Non-maintainer upload by Security team * Security update for stable which fixes double evaluation of $-expandos in dangerous cases. * Applied upstream fix for brokenly fixed double evaluation of $-expandos in nickname and channel name when zapping stable/main/binary-alpha/elk_3.0-8.1_alpha.deb elk (3.0-8.1) unstable; urgency=low * NMU. * Added missing build dependencies (closes: #109854, #116532). * Fix menu item (closes: #121004). * Apply patch to make package lintian clean (closes: #126987). * src/build: include debian/arch-config to specify build flags for the alpha (-O0). May fix #59893. stable/main/source/docbook-xml-slides_1.1-2.1woody2.dsc stable/main/source/docbook-xml-slides_1.1-2.1woody2.diff.gz stable/main/binary-all/docbook-xml-slides_1.1-2.1woody2_all.deb docbook-xml-slides (1.1-2.1woody2) stable; urgency=low * Really upload to woody. docbook-xml-slides (1.1-2.1woody1) unstable; urgency=low * Non-maintainer upload. * Backported to woody. docbook-xml-slides (1.1-2.2) unstable; urgency=medium * Non-maintainer upload * Fixed dependency, so that this package can coexist with others (Closes: #157398). This should have been done long ago, I'll be preparing a version for woody as well - I already had to rebuild this package twice, and already explained to other people on IRC how to do that themselves. * Use Build-depends-indep, not just build-depends, as lintian noticed. stable/main/binary-powerpc/dietlibc-dev_0.12-2.4_powerpc.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-mipsel/dietlibc-dev_0.12-2.4_mipsel.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-mips/dietlibc-dev_0.12-2.4_mips.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-i386/dietlibc-dev_0.12-2.4_i386.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-arm/dietlibc-dev_0.12-2.4_arm.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-alpha/dietlibc-dev_0.12-2.4_alpha.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/source/dietlibc_0.12-2.4.diff.gz stable/main/binary-all/dietlibc-doc_0.12-2.4_all.deb stable/main/binary-sparc/dietlibc-dev_0.12-2.4_sparc.deb stable/main/source/dietlibc_0.12-2.4.dsc dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/source/defrag_0.73pjm1-1.woody.0.dsc stable/main/binary-i386/defrag_0.73pjm1-1.woody.0_i386.deb stable/main/source/defrag_0.73pjm1-1.woody.0.diff.gz defrag (0.73pjm1-1.woody.0) stable; urgency=high * debian/control: fixed speling erorr in package description (closes: #124541) * debian/copyright: fixed mis-spelling common-licences -> common-licenses * ext2.c: Gracefully fail on filesystems with journals (closes: #118635). This fixes a bug that causes filesystem corruption when defrag is run on ext3 filesystems. stable/main/source/debiandoc-sgml_1.1.67woody1.dsc stable/main/source/debiandoc-sgml_1.1.67woody1.tar.gz stable/main/binary-all/debiandoc-sgml_1.1.67woody1_all.deb debiandoc-sgml (1.1.67woody1) stable; urgency=low * debian/postinst: added invocation of 'install-sgmlcatalog --remove debiandoc-sgml' to clean up cruft potentially left over from the SGML catalog transition in a potato -> woody upgrade (closes: Bug#154737) stable/main/source/cron-apt_0.0.6woody1.tar.gz stable/main/source/cron-apt_0.0.6woody1.dsc stable/main/binary-all/cron-apt_0.0.6woody1_all.deb cron-apt (0.0.6woody1) stable; urgency=high * Added default path so the upgrade will work fine. Thanks to Donovan Baarda for pointing out the problem. Closes: #158869. This is a backport from version 0.0.7 which has been tested for a couple of months without any reports of failure. stable/main/binary-sparc/courier-mta_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-debug_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-authmysql_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-pop_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-webadmin_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-maildrop_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-base_0.37.3-2.3_sparc.deb stable/main/binary-sparc/sqwebmail_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-imap_1.4.3-2.3_sparc.deb stable/main/binary-sparc/courier-mlm_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-authdaemon_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-pcp_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-ldap_0.37.3-2.3_sparc.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/courier-maildrop_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-ldap_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-imap_1.4.3-2.3_s390.deb stable/main/binary-s390/courier-authdaemon_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-pop_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-pcp_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-webadmin_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-authmysql_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-mta_0.37.3-2.3_s390.deb stable/main/binary-s390/sqwebmail_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-mlm_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-debug_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-base_0.37.3-2.3_s390.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/courier-pcp_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-webadmin_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-pop_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-maildrop_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/sqwebmail_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-base_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-ldap_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-authmysql_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-imap_1.4.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-mlm_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-mta_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-debug_0.37.3-2.3_powerpc.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/courier-authmysql_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-imap_1.4.3-2.3_mips.deb stable/main/binary-mips/courier-pop_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-webadmin_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-maildrop_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-ldap_0.37.3-2.3_mips.deb stable/main/binary-mips/sqwebmail_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-mlm_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-pcp_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-mta_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-base_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-debug_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-authdaemon_0.37.3-2.3_mips.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/courier-authmysql_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-ldap_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-webadmin_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-imap_1.4.3-2.3_m68k.deb stable/main/binary-m68k/courier-maildrop_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-base_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-authdaemon_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-pcp_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-debug_0.37.3-2.3_m68k.deb stable/main/binary-m68k/sqwebmail_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-mta_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-mlm_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-pop_0.37.3-2.3_m68k.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/courier-imap_1.4.3-2.3_ia64.deb stable/main/binary-ia64/courier-authdaemon_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-pop_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-authmysql_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-base_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-ldap_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-pcp_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-mta_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-maildrop_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-debug_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-mlm_0.37.3-2.3_ia64.deb stable/main/binary-ia64/sqwebmail_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-webadmin_0.37.3-2.3_ia64.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/courier-base_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-mta_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-authdaemon_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-webadmin_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-pop_0.37.3-2.3_i386.deb stable/main/binary-i386/sqwebmail_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-imap_1.4.3-2.3_i386.deb stable/main/binary-i386/courier-maildrop_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-mlm_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-debug_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-authmysql_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-ldap_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-pcp_0.37.3-2.3_i386.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/courier-base_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-webadmin_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-pop_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-mta_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-maildrop_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-imap_1.4.3-2.3_hppa.deb stable/main/binary-hppa/courier-authdaemon_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-mlm_0.37.3-2.3_hppa.deb stable/main/binary-hppa/sqwebmail_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-ldap_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-pcp_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-debug_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-authmysql_0.37.3-2.3_hppa.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/courier-debug_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-ldap_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-authmysql_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-base_0.37.3-2.3_arm.deb stable/main/binary-arm/sqwebmail_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-imap_1.4.3-2.3_arm.deb stable/main/binary-arm/courier-maildrop_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-mlm_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-pop_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-webadmin_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-pcp_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-authdaemon_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-mta_0.37.3-2.3_arm.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/courier-mta_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-maildrop_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-authdaemon_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-authmysql_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-webadmin_0.37.3-2.3_alpha.deb stable/main/binary-alpha/sqwebmail_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-imap_1.4.3-2.3_alpha.deb stable/main/binary-alpha/courier-ldap_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-mlm_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-pcp_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-pop_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-debug_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-base_0.37.3-2.3_alpha.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/courier-ldap_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-imap_1.4.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-maildrop_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-mlm_0.37.3-2.3_mipsel.deb stable/main/binary-all/courier-doc_0.37.3-2.3_all.deb stable/main/binary-mipsel/courier-webadmin_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-pop_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-pcp_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-authmysql_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-mta_0.37.3-2.3_mipsel.deb stable/main/source/courier_0.37.3-2.3.dsc stable/main/binary-mipsel/sqwebmail_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-base_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-debug_0.37.3-2.3_mipsel.deb stable/main/source/courier_0.37.3-2.3.diff.gz stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.3_mipsel.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-all/bugzilla-doc_2.14.2-0woody2_all.deb stable/main/source/bugzilla_2.14.2-0woody2.dsc stable/main/binary-all/bugzilla_2.14.2-0woody2_all.deb stable/main/source/bugzilla_2.14.2-0woody2.diff.gz bugzilla (2.14.2-0woody2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed bit handling for new products to avoid errors in group handling triggered by not exact Perl maths beyond 2^48. Backport from new upstream 2.14.4. stable/main/binary-sparc/bastille_1.3.0-2.1_sparc.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-s390/bastille_1.3.0-2.1_s390.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-powerpc/bastille_1.3.0-2.1_powerpc.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mipsel/bastille_1.3.0-2.1_mipsel.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mips/bastille_1.3.0-2.1_mips.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-m68k/bastille_1.3.0-2.1_m68k.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-ia64/bastille_1.3.0-2.1_ia64.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-hppa/bastille_1.3.0-2.1_hppa.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-arm/bastille_1.3.0-2.1_arm.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-alpha/bastille_1.3.0-2.1_alpha.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/source/bastille_1.3.0-2.1.dsc stable/main/binary-i386/bastille_1.3.0-2.1_i386.deb stable/main/source/bastille_1.3.0-2.1.diff.gz bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mips/arcboot_0.3.3.9.woody.0_mips.deb stable/main/source/arcboot_0.3.3.9.woody.0.dsc stable/main/source/arcboot_0.3.3.9.woody.0.tar.gz stable/main/binary-mips/tip22_0.3.3.9.woody.0_mips.deb arcboot (0.3.3.9.woody.0) stable; urgency=medium * recompile 0.3.4 for Woody r1: - fix loader crashes on extfs errors - add tip22 (piggyback style tftp loader) needed by boot floppies for kernels newer then 2.4.16 * disable debugging output stable/main/binary-s390/apache-ssl_1.3.26.1+1.48-0woody3_s390.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-ssl_1.3.26.1+1.48-0woody3_powerpc.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache-ssl_1.3.26.1+1.48-0woody3_mipsel.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache-ssl_1.3.26.1+1.48-0woody3_mips.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-ssl_1.3.26.1+1.48-0woody3_m68k.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache-ssl_1.3.26.1+1.48-0woody3_ia64.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-ssl_1.3.26.1+1.48-0woody3_i386.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-ssl_1.3.26.1+1.48-0woody3_hppa.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-ssl_1.3.26.1+1.48-0woody3_arm.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache-ssl_1.3.26.1+1.48-0woody3_alpha.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.diff.gz stable/main/binary-sparc/apache-ssl_1.3.26.1+1.48-0woody3_sparc.deb stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.dsc apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-s390/apache-perl_1.3.26-1-1.26-0woody2_s390.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-perl_1.3.26-1-1.26-0woody2_powerpc.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache-perl_1.3.26-1-1.26-0woody2_mipsel.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache-perl_1.3.26-1-1.26-0woody2_mips.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-perl_1.3.26-1-1.26-0woody2_m68k.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache-perl_1.3.26-1-1.26-0woody2_ia64.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-perl_1.3.26-1-1.26-0woody2_i386.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-perl_1.3.26-1-1.26-0woody2_hppa.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-perl_1.3.26-1-1.26-0woody2_arm.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache-perl_1.3.26-1-1.26-0woody2_alpha.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-sparc/apache-perl_1.3.26-1-1.26-0woody2_sparc.deb stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.dsc stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.tar.gz apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-s390/apache-dev_1.3.26-0woody3_s390.deb stable/main/binary-s390/apache-common_1.3.26-0woody3_s390.deb stable/main/binary-s390/apache_1.3.26-0woody3_s390.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-dev_1.3.26-0woody3_powerpc.deb stable/main/binary-powerpc/apache_1.3.26-0woody3_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.26-0woody3_powerpc.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache_1.3.26-0woody3_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.26-0woody3_mipsel.deb stable/main/binary-mipsel/apache-dev_1.3.26-0woody3_mipsel.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache_1.3.26-0woody3_mips.deb stable/main/binary-mips/apache-dev_1.3.26-0woody3_mips.deb stable/main/binary-mips/apache-common_1.3.26-0woody3_mips.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-dev_1.3.26-0woody3_m68k.deb stable/main/binary-m68k/apache_1.3.26-0woody3_m68k.deb stable/main/binary-m68k/apache-common_1.3.26-0woody3_m68k.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache_1.3.26-0woody3_ia64.deb stable/main/binary-ia64/apache-dev_1.3.26-0woody3_ia64.deb stable/main/binary-ia64/apache-common_1.3.26-0woody3_ia64.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-common_1.3.26-0woody3_i386.deb stable/main/binary-i386/apache-dev_1.3.26-0woody3_i386.deb stable/main/binary-i386/apache_1.3.26-0woody3_i386.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-common_1.3.26-0woody3_hppa.deb stable/main/binary-hppa/apache_1.3.26-0woody3_hppa.deb stable/main/binary-hppa/apache-dev_1.3.26-0woody3_hppa.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-common_1.3.26-0woody3_arm.deb stable/main/binary-arm/apache_1.3.26-0woody3_arm.deb stable/main/binary-arm/apache-dev_1.3.26-0woody3_arm.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache_1.3.26-0woody3_alpha.deb stable/main/binary-alpha/apache-dev_1.3.26-0woody3_alpha.deb stable/main/binary-alpha/apache-common_1.3.26-0woody3_alpha.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-sparc/apache-dev_1.3.26-0woody3_sparc.deb stable/main/source/apache_1.3.26-0woody3.diff.gz stable/main/binary-sparc/apache_1.3.26-0woody3_sparc.deb stable/main/binary-sparc/apache-common_1.3.26-0woody3_sparc.deb stable/main/source/apache_1.3.26-0woody3.dsc stable/main/binary-all/apache-doc_1.3.26-0woody3_all.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/afterstep_1.8.11-5woody1_powerpc.deb afterstep (1.8.11-5woody1) stable; urgency=low * Upload file overlapping fix from 1.8.11-5 to woody. stable/main/binary-arm/afterstep_1.8.11-5woody1_arm.deb afterstep (1.8.11-5woody1) testing; urgency=low * Upload file overlapping fix from 1.8.11-5 to woody. ========================================= Sat, 20 Jul 2002 - Debian 3.0r0 released =========================================