========================================= Tue, 31 May 2005 - Debian 3.0r6 released ========================================= stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xutils_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/proxymngr_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libdps1_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libdps-dev_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xprt_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw6_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibmesa3_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xnest_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xserver-common_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/twm_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/lbxproxy_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xbase-clients_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibs-pic_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibs-dev_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xfwp_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xterm_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xmh_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xdm_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xfs_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/x-window-system-core_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/libxaw7_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibs_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xvfb_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody6_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody6_sparc.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-s390/libxaw6_4.1.0-16woody6_s390.deb stable/main/binary-s390/xserver-common_4.1.0-16woody6_s390.deb stable/main/binary-s390/xfwp_4.1.0-16woody6_s390.deb stable/main/binary-s390/xmh_4.1.0-16woody6_s390.deb stable/main/binary-s390/libdps1_4.1.0-16woody6_s390.deb stable/main/binary-s390/twm_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody6_s390.deb stable/main/binary-s390/xvfb_4.1.0-16woody6_s390.deb stable/main/binary-s390/libxaw7-dev_4.1.0-16woody6_s390.deb stable/main/binary-s390/libdps-dev_4.1.0-16woody6_s390.deb stable/main/binary-s390/xutils_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibs-dbg_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibmesa3_4.1.0-16woody6_s390.deb stable/main/binary-s390/libxaw7_4.1.0-16woody6_s390.deb stable/main/binary-s390/xdm_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibs-dev_4.1.0-16woody6_s390.deb stable/main/binary-s390/x-window-system-core_4.1.0-16woody6_s390.deb stable/main/binary-s390/xterm_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibs_4.1.0-16woody6_s390.deb stable/main/binary-s390/xfs_4.1.0-16woody6_s390.deb stable/main/binary-s390/xnest_4.1.0-16woody6_s390.deb stable/main/binary-s390/lbxproxy_4.1.0-16woody6_s390.deb stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody6_s390.deb stable/main/binary-s390/xprt_4.1.0-16woody6_s390.deb stable/main/binary-s390/libdps1-dbg_4.1.0-16woody6_s390.deb stable/main/binary-s390/proxymngr_4.1.0-16woody6_s390.deb stable/main/binary-s390/xbase-clients_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody6_s390.deb stable/main/binary-s390/xlibs-pic_4.1.0-16woody6_s390.deb stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody6_s390.deb stable/main/binary-s390/libxaw6-dev_4.1.0-16woody6_s390.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-mipsel/xterm_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xmh_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xfwp_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibs_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xserver-common_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xvfb_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw7_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xbase-clients_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xdm_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libdps1_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/twm_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/proxymngr_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xprt_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xfs_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw6_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xnest_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xutils_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody6_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody6_mipsel.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-mips/xterm_4.1.0-16woody6_mips.deb stable/main/binary-mips/xvfb_4.1.0-16woody6_mips.deb stable/main/binary-mips/twm_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody6_mips.deb stable/main/binary-mips/xdm_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibmesa3_4.1.0-16woody6_mips.deb stable/main/binary-mips/x-window-system-core_4.1.0-16woody6_mips.deb stable/main/binary-mips/proxymngr_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw7-dev_4.1.0-16woody6_mips.deb stable/main/binary-mips/xmh_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw6_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw7_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody6_mips.deb stable/main/binary-mips/xfwp_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibs_4.1.0-16woody6_mips.deb stable/main/binary-mips/xfs_4.1.0-16woody6_mips.deb stable/main/binary-mips/libdps-dev_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibs-pic_4.1.0-16woody6_mips.deb stable/main/binary-mips/xserver-common_4.1.0-16woody6_mips.deb stable/main/binary-mips/lbxproxy_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibs-dbg_4.1.0-16woody6_mips.deb stable/main/binary-mips/xutils_4.1.0-16woody6_mips.deb stable/main/binary-mips/libdps1_4.1.0-16woody6_mips.deb stable/main/binary-mips/xnest_4.1.0-16woody6_mips.deb stable/main/binary-mips/xserver-xfree86_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw6-dev_4.1.0-16woody6_mips.deb stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody6_mips.deb stable/main/binary-mips/libdps1-dbg_4.1.0-16woody6_mips.deb stable/main/binary-mips/xbase-clients_4.1.0-16woody6_mips.deb stable/main/binary-mips/xprt_4.1.0-16woody6_mips.deb stable/main/binary-mips/xlibs-dev_4.1.0-16woody6_mips.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-m68k/x-window-system-core_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xbase-clients_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xutils_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libdps1_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xfwp_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libdps-dev_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibs-dev_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibs-pic_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibmesa3_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xdm_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xterm_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/twm_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xserver-common_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/lbxproxy_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xvfb_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw6_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xfs_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xmh_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/proxymngr_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xprt_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xnest_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/xlibs_4.1.0-16woody6_m68k.deb stable/main/binary-m68k/libxaw7_4.1.0-16woody6_m68k.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibmesa3_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xvfb_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xbase-clients_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xserver-common_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libdps-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xdm_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw7_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xfs_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xmh_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xterm_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw6_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xfwp_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xnest_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/x-window-system-core_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/lbxproxy_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibs-pic_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/twm_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xutils_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibs-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/proxymngr_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libdps1_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xprt_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/xlibs_4.1.0-16woody6_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody6_ia64.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/libxaw7_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibosmesa3_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/libxaw7-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/xutils_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/libdps1-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibs-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/xvfb_4.1.0-16woody6_i386.deb stable/main/binary-i386/libdps-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/xfs_4.1.0-16woody6_i386.deb stable/main/binary-i386/xfwp_4.1.0-16woody6_i386.deb stable/main/binary-i386/libdps1_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/libxaw6_4.1.0-16woody6_i386.deb stable/main/binary-i386/lbxproxy_4.1.0-16woody6_i386.deb stable/main/binary-i386/xbase-clients_4.1.0-16woody6_i386.deb stable/main/binary-i386/xmh_4.1.0-16woody6_i386.deb stable/main/binary-i386/twm_4.1.0-16woody6_i386.deb stable/main/binary-i386/xserver-xfree86_4.1.0-16woody6_i386.deb stable/main/binary-i386/xprt_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibs-pic_4.1.0-16woody6_i386.deb stable/main/binary-i386/x-window-system-core_4.1.0-16woody6_i386.deb stable/main/binary-i386/proxymngr_4.1.0-16woody6_i386.deb stable/main/binary-i386/xnest_4.1.0-16woody6_i386.deb stable/main/binary-i386/libxaw6-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibmesa3_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibs-dev_4.1.0-16woody6_i386.deb stable/main/binary-i386/xdm_4.1.0-16woody6_i386.deb stable/main/binary-i386/xserver-common_4.1.0-16woody6_i386.deb stable/main/binary-i386/xterm_4.1.0-16woody6_i386.deb stable/main/binary-i386/xlibs_4.1.0-16woody6_i386.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-hppa/libdps-dev_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibs_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xprt_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibmesa3_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xvfb_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/lbxproxy_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libdps1_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw7_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xserver-common_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw6_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xfwp_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xbase-clients_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/twm_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xterm_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xmh_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xutils_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xdm_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xnest_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/proxymngr_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibs-dev_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/x-window-system-core_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xlibs-pic_4.1.0-16woody6_hppa.deb stable/main/binary-hppa/xfs_4.1.0-16woody6_hppa.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-arm/xnest_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody6_arm.deb stable/main/binary-arm/xutils_4.1.0-16woody6_arm.deb stable/main/binary-arm/xserver-xfree86_4.1.0-16woody6_arm.deb stable/main/binary-arm/x-window-system-core_4.1.0-16woody6_arm.deb stable/main/binary-arm/xbase-clients_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw6_4.1.0-16woody6_arm.deb stable/main/binary-arm/xserver-common_4.1.0-16woody6_arm.deb stable/main/binary-arm/lbxproxy_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody6_arm.deb stable/main/binary-arm/xvfb_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibs-dev_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibs-pic_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody6_arm.deb stable/main/binary-arm/proxymngr_4.1.0-16woody6_arm.deb stable/main/binary-arm/xdm_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibs_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw7-dev_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw6-dev_4.1.0-16woody6_arm.deb stable/main/binary-arm/xterm_4.1.0-16woody6_arm.deb stable/main/binary-arm/xprt_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibmesa3_4.1.0-16woody6_arm.deb stable/main/binary-arm/libxaw7_4.1.0-16woody6_arm.deb stable/main/binary-arm/xfs_4.1.0-16woody6_arm.deb stable/main/binary-arm/libdps1-dbg_4.1.0-16woody6_arm.deb stable/main/binary-arm/libdps1_4.1.0-16woody6_arm.deb stable/main/binary-arm/twm_4.1.0-16woody6_arm.deb stable/main/binary-arm/libdps-dev_4.1.0-16woody6_arm.deb stable/main/binary-arm/xlibs-dbg_4.1.0-16woody6_arm.deb stable/main/binary-arm/xmh_4.1.0-16woody6_arm.deb stable/main/binary-arm/xfwp_4.1.0-16woody6_arm.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-alpha/xvfb_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libdps-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xfs_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibmesa3_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/lbxproxy_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libdps1_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xbase-clients_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/x-window-system-core_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibs-pic_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xmh_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xfwp_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw6_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/twm_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xnest_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xutils_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibs-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibs_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw7_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xserver-common_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xterm_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xdm_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/xprt_4.1.0-16woody6_alpha.deb stable/main/binary-alpha/proxymngr_4.1.0-16woody6_alpha.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-powerpc/xmh_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/proxymngr_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xspecs_4.1.0-16woody6_all.deb stable/main/binary-powerpc/libxaw6_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xlib6g-dev_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xfwp_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xlib6g_4.1.0-16woody6_all.deb stable/main/binary-all/xfonts-75dpi_4.1.0-16woody6_all.deb stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libdps-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody6_all.deb stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-base_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xserver-common_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-scalable_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xfs_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xutils_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xprt_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xdm_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xlibs_4.1.0-16woody6_powerpc.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody6_all.deb stable/main/binary-all/xfonts-pex_4.1.0-16woody6_all.deb stable/main/binary-all/xfree86-common_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xbase-clients_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xnest_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/twm_4.1.0-16woody6_powerpc.deb stable/main/binary-all/x-window-system_4.1.0-16woody6_all.deb stable/main/binary-powerpc/lbxproxy_4.1.0-16woody6_powerpc.deb stable/main/source/xfree86_4.1.0-16woody6.dsc stable/main/binary-all/xfonts-100dpi_4.1.0-16woody6_all.deb stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libxaw7_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libdps1_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody6_powerpc.deb stable/main/binary-powerpc/xvfb_4.1.0-16woody6_powerpc.deb stable/main/source/xfree86_4.1.0-16woody6.diff.gz stable/main/binary-powerpc/xterm_4.1.0-16woody6_powerpc.deb xfree86 (4.1.0-16woody6) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. (Closes: #298939) * Update patch #076 (XPM library security fixes) to revert regressions in functionality caused by overly aggressive validation of filespec strings in OpenReadFile() and OpenWriteFile(). (Fixes #286164 for woody.) stable/main/binary-sparc/vim_6.1.018-1woody1_sparc.deb stable/main/binary-sparc/vim-gtk_6.1.018-1woody1_sparc.deb stable/main/binary-sparc/vim-perl_6.1.018-1woody1_sparc.deb stable/main/binary-sparc/vim-tcl_6.1.018-1woody1_sparc.deb stable/main/binary-sparc/vim-python_6.1.018-1woody1_sparc.deb stable/main/binary-sparc/vim-ruby_6.1.018-1woody1_sparc.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-s390/vim-tcl_6.1.018-1woody1_s390.deb stable/main/binary-s390/vim-perl_6.1.018-1woody1_s390.deb stable/main/binary-s390/vim_6.1.018-1woody1_s390.deb stable/main/binary-s390/vim-python_6.1.018-1woody1_s390.deb stable/main/binary-s390/vim-gtk_6.1.018-1woody1_s390.deb stable/main/binary-s390/vim-ruby_6.1.018-1woody1_s390.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-powerpc/vim-tcl_6.1.018-1woody1_powerpc.deb stable/main/binary-powerpc/vim-perl_6.1.018-1woody1_powerpc.deb stable/main/binary-powerpc/vim-python_6.1.018-1woody1_powerpc.deb stable/main/binary-powerpc/vim-gtk_6.1.018-1woody1_powerpc.deb stable/main/binary-powerpc/vim-ruby_6.1.018-1woody1_powerpc.deb stable/main/binary-powerpc/vim_6.1.018-1woody1_powerpc.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-mipsel/vim_6.1.018-1woody1_mipsel.deb stable/main/binary-mipsel/vim-ruby_6.1.018-1woody1_mipsel.deb stable/main/binary-mipsel/vim-gtk_6.1.018-1woody1_mipsel.deb stable/main/binary-mipsel/vim-python_6.1.018-1woody1_mipsel.deb stable/main/binary-mipsel/vim-perl_6.1.018-1woody1_mipsel.deb stable/main/binary-mipsel/vim-tcl_6.1.018-1woody1_mipsel.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-mips/vim-python_6.1.018-1woody1_mips.deb stable/main/binary-mips/vim-gtk_6.1.018-1woody1_mips.deb stable/main/binary-mips/vim-ruby_6.1.018-1woody1_mips.deb stable/main/binary-mips/vim_6.1.018-1woody1_mips.deb stable/main/binary-mips/vim-tcl_6.1.018-1woody1_mips.deb stable/main/binary-mips/vim-perl_6.1.018-1woody1_mips.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-m68k/vim-gtk_6.1.018-1woody1_m68k.deb stable/main/binary-m68k/vim-ruby_6.1.018-1woody1_m68k.deb stable/main/binary-m68k/vim-python_6.1.018-1woody1_m68k.deb stable/main/binary-m68k/vim-perl_6.1.018-1woody1_m68k.deb stable/main/binary-m68k/vim-tcl_6.1.018-1woody1_m68k.deb stable/main/binary-m68k/vim_6.1.018-1woody1_m68k.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-ia64/vim-perl_6.1.018-1woody1_ia64.deb stable/main/binary-ia64/vim-tcl_6.1.018-1woody1_ia64.deb stable/main/binary-ia64/vim-python_6.1.018-1woody1_ia64.deb stable/main/binary-ia64/vim-gtk_6.1.018-1woody1_ia64.deb stable/main/binary-ia64/vim_6.1.018-1woody1_ia64.deb stable/main/binary-ia64/vim-ruby_6.1.018-1woody1_ia64.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-hppa/vim-ruby_6.1.018-1woody1_hppa.deb stable/main/binary-hppa/vim-perl_6.1.018-1woody1_hppa.deb stable/main/binary-hppa/vim-tcl_6.1.018-1woody1_hppa.deb stable/main/binary-hppa/vim-python_6.1.018-1woody1_hppa.deb stable/main/binary-hppa/vim_6.1.018-1woody1_hppa.deb stable/main/binary-hppa/vim-gtk_6.1.018-1woody1_hppa.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-arm/vim-python_6.1.018-1woody1_arm.deb stable/main/binary-arm/vim-tcl_6.1.018-1woody1_arm.deb stable/main/binary-arm/vim-gtk_6.1.018-1woody1_arm.deb stable/main/binary-arm/vim_6.1.018-1woody1_arm.deb stable/main/binary-arm/vim-perl_6.1.018-1woody1_arm.deb stable/main/binary-arm/vim-ruby_6.1.018-1woody1_arm.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-alpha/vim-python_6.1.018-1woody1_alpha.deb stable/main/binary-alpha/vim-ruby_6.1.018-1woody1_alpha.deb stable/main/binary-alpha/vim_6.1.018-1woody1_alpha.deb stable/main/binary-alpha/vim-tcl_6.1.018-1woody1_alpha.deb stable/main/binary-alpha/vim-gtk_6.1.018-1woody1_alpha.deb stable/main/binary-alpha/vim-perl_6.1.018-1woody1_alpha.deb vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-i386/vim-perl_6.1.018-1woody1_i386.deb stable/main/binary-i386/vim-tcl_6.1.018-1woody1_i386.deb stable/main/source/vim_6.1.018-1woody1.diff.gz stable/main/binary-i386/vim_6.1.018-1woody1_i386.deb stable/main/binary-i386/vim-ruby_6.1.018-1woody1_i386.deb stable/main/binary-i386/vim-gtk_6.1.018-1woody1_i386.deb stable/main/binary-i386/vim-python_6.1.018-1woody1_i386.deb stable/main/source/vim_6.1.018.orig.tar.gz stable/main/source/vim_6.1.018-1woody1.dsc vim (6.1.018-1woody1) stable; urgency=medium * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several vulnerabilities related to the use of options in modelines. (closes: #286223) * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create temporary files in vimspell.sh and tcltags. (closes: #289560, #291125) * Set maintainer address to project mailinglist on alioth and added myself to uploaders. stable/main/binary-sparc/ssmtp_2.50.6.3_sparc.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-s390/ssmtp_2.50.6.3_s390.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-powerpc/ssmtp_2.50.6.3_powerpc.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-mipsel/ssmtp_2.50.6.3_mipsel.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-mips/ssmtp_2.50.6.3_mips.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-m68k/ssmtp_2.50.6.3_m68k.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-ia64/ssmtp_2.50.6.3_ia64.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-hppa/ssmtp_2.50.6.3_hppa.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-arm/ssmtp_2.50.6.3_arm.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-alpha/ssmtp_2.50.6.3_alpha.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/source/ssmtp_2.50.6.3.dsc stable/main/source/ssmtp_2.50.6.3.tar.gz stable/main/binary-i386/ssmtp_2.50.6.3_i386.deb ssmtp (2.50.6.3) stable; urgency=medium * Reapplied patch to version 2.50.6.1. Fixes security RC bug "ssmtp mangles messages in transit" found by Michelle Konzack , closes: #298054. Patch by Jeff King . stable/main/binary-sparc/squid-cgi_2.4.6-2woody8_sparc.deb stable/main/binary-sparc/squidclient_2.4.6-2woody8_sparc.deb stable/main/binary-sparc/squid_2.4.6-2woody8_sparc.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-s390/squid-cgi_2.4.6-2woody8_s390.deb stable/main/binary-s390/squidclient_2.4.6-2woody8_s390.deb stable/main/binary-s390/squid_2.4.6-2woody8_s390.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-powerpc/squid-cgi_2.4.6-2woody8_powerpc.deb stable/main/binary-powerpc/squid_2.4.6-2woody8_powerpc.deb stable/main/binary-powerpc/squidclient_2.4.6-2woody8_powerpc.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-mipsel/squid_2.4.6-2woody8_mipsel.deb stable/main/binary-mipsel/squidclient_2.4.6-2woody8_mipsel.deb stable/main/binary-mipsel/squid-cgi_2.4.6-2woody8_mipsel.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-mips/squid-cgi_2.4.6-2woody8_mips.deb stable/main/binary-mips/squid_2.4.6-2woody8_mips.deb stable/main/binary-mips/squidclient_2.4.6-2woody8_mips.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-m68k/squid-cgi_2.4.6-2woody8_m68k.deb stable/main/binary-m68k/squidclient_2.4.6-2woody8_m68k.deb stable/main/binary-m68k/squid_2.4.6-2woody8_m68k.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-ia64/squid_2.4.6-2woody8_ia64.deb stable/main/binary-ia64/squidclient_2.4.6-2woody8_ia64.deb stable/main/binary-ia64/squid-cgi_2.4.6-2woody8_ia64.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-hppa/squid-cgi_2.4.6-2woody8_hppa.deb stable/main/binary-hppa/squid_2.4.6-2woody8_hppa.deb stable/main/binary-hppa/squidclient_2.4.6-2woody8_hppa.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-arm/squidclient_2.4.6-2woody8_arm.deb stable/main/binary-arm/squid_2.4.6-2woody8_arm.deb stable/main/binary-arm/squid-cgi_2.4.6-2woody8_arm.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-alpha/squid-cgi_2.4.6-2woody8_alpha.deb stable/main/binary-alpha/squidclient_2.4.6-2woody8_alpha.deb stable/main/binary-alpha/squid_2.4.6-2woody8_alpha.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-i386/squidclient_2.4.6-2woody8_i386.deb stable/main/source/squid_2.4.6-2woody8.diff.gz stable/main/binary-i386/squid_2.4.6-2woody8_i386.deb stable/main/source/squid_2.4.6-2woody8.dsc stable/main/binary-i386/squid-cgi_2.4.6-2woody8_i386.deb squid (2.4.6-2woody8) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for missing checks on incomplete ACLs o squid-2.5.STABLE9-acl_error.patch o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345 stable/main/binary-sparc/smartlist_3.15-5.woody.1_sparc.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-s390/smartlist_3.15-5.woody.1_s390.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-powerpc/smartlist_3.15-5.woody.1_powerpc.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-mipsel/smartlist_3.15-5.woody.1_mipsel.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-mips/smartlist_3.15-5.woody.1_mips.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-m68k/smartlist_3.15-5.woody.1_m68k.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-ia64/smartlist_3.15-5.woody.1_ia64.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-hppa/smartlist_3.15-5.woody.1_hppa.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-arm/smartlist_3.15-5.woody.1_arm.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-alpha/smartlist_3.15-5.woody.1_alpha.deb smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-i386/smartlist_3.15-5.woody.1_i386.deb stable/main/source/smartlist_3.15-5.woody.1.dsc stable/main/source/smartlist_3.15-5.woody.1.diff.gz smartlist (3.15-5.woody.1) stable-security; urgency=low * Fixed dangerous use of multigram in the subscribing code. A valid cookie could be used to subscribe an address which is not the one in the cookie. This is CAN-2005-0157. stable/main/binary-sparc/smail_3.2.0.114-4woody1_sparc.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-s390/smail_3.2.0.114-4woody1_s390.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-powerpc/smail_3.2.0.114-4woody1_powerpc.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-mipsel/smail_3.2.0.114-4woody1_mipsel.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-mips/smail_3.2.0.114-4woody1_mips.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-m68k/smail_3.2.0.114-4woody1_m68k.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-ia64/smail_3.2.0.114-4woody1_ia64.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-hppa/smail_3.2.0.114-4woody1_hppa.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-arm/smail_3.2.0.114-4woody1_arm.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-alpha/smail_3.2.0.114-4woody1_alpha.deb smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-i386/smail_3.2.0.114-4woody1_i386.deb stable/main/source/smail_3.2.0.114-4woody1.dsc stable/main/source/smail_3.2.0.114-4woody1.diff.gz smail (3.2.0.114-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from the discoverer to fix a buffer overflow [src/addr.c, CAN-2005-0892] stable/main/binary-sparc/swat_2.2.3a-15_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-15_sparc.deb stable/main/binary-sparc/samba-common_2.2.3a-15_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-15_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-15_sparc.deb stable/main/binary-sparc/libpam-smbpass_2.2.3a-15_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-15_sparc.deb stable/main/binary-sparc/samba_2.2.3a-15_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-15_sparc.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-s390/smbclient_2.2.3a-15_s390.deb stable/main/binary-s390/samba_2.2.3a-15_s390.deb stable/main/binary-s390/samba-common_2.2.3a-15_s390.deb stable/main/binary-s390/libpam-smbpass_2.2.3a-15_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-15_s390.deb stable/main/binary-s390/libsmbclient-dev_2.2.3a-15_s390.deb stable/main/binary-s390/swat_2.2.3a-15_s390.deb stable/main/binary-s390/winbind_2.2.3a-15_s390.deb stable/main/binary-s390/smbfs_2.2.3a-15_s390.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-powerpc/winbind_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/samba_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-15_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-15_powerpc.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-mipsel/smbfs_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/samba-common_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/smbclient_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-15_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-15_mipsel.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-mips/swat_2.2.3a-15_mips.deb stable/main/binary-mips/smbfs_2.2.3a-15_mips.deb stable/main/binary-mips/samba-common_2.2.3a-15_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-15_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-15_mips.deb stable/main/binary-mips/smbclient_2.2.3a-15_mips.deb stable/main/binary-mips/winbind_2.2.3a-15_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-15_mips.deb stable/main/binary-mips/samba_2.2.3a-15_mips.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-m68k/winbind_2.2.3a-15_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-15_m68k.deb stable/main/binary-m68k/samba-common_2.2.3a-15_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-15_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-15_m68k.deb stable/main/binary-m68k/smbfs_2.2.3a-15_m68k.deb stable/main/binary-m68k/swat_2.2.3a-15_m68k.deb stable/main/binary-m68k/samba_2.2.3a-15_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-15_m68k.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-ia64/smbclient_2.2.3a-15_ia64.deb stable/main/binary-ia64/smbfs_2.2.3a-15_ia64.deb stable/main/binary-ia64/samba_2.2.3a-15_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-15_ia64.deb stable/main/binary-ia64/libsmbclient_2.2.3a-15_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-15_ia64.deb stable/main/binary-ia64/swat_2.2.3a-15_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-15_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-15_ia64.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-i386/samba_2.2.3a-15_i386.deb stable/main/binary-i386/winbind_2.2.3a-15_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-15_i386.deb stable/main/binary-i386/swat_2.2.3a-15_i386.deb stable/main/binary-i386/libsmbclient-dev_2.2.3a-15_i386.deb stable/main/binary-i386/libpam-smbpass_2.2.3a-15_i386.deb stable/main/binary-i386/samba-common_2.2.3a-15_i386.deb stable/main/binary-i386/smbclient_2.2.3a-15_i386.deb stable/main/binary-i386/smbfs_2.2.3a-15_i386.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-hppa/swat_2.2.3a-15_hppa.deb stable/main/binary-hppa/libsmbclient_2.2.3a-15_hppa.deb stable/main/binary-hppa/samba_2.2.3a-15_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-15_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-15_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-15_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-15_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-15_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-15_hppa.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-alpha/smbclient_2.2.3a-15_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-15_alpha.deb stable/main/binary-alpha/libsmbclient-dev_2.2.3a-15_alpha.deb stable/main/binary-alpha/libpam-smbpass_2.2.3a-15_alpha.deb stable/main/binary-alpha/samba_2.2.3a-15_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-15_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-15_alpha.deb stable/main/binary-alpha/swat_2.2.3a-15_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-15_alpha.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-arm/smbclient_2.2.3a-15_arm.deb stable/main/binary-arm/samba_2.2.3a-15_arm.deb stable/main/binary-arm/samba-common_2.2.3a-15_arm.deb stable/main/source/samba_2.2.3a-15.diff.gz stable/main/binary-arm/swat_2.2.3a-15_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-15_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-15_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-15_arm.deb stable/main/binary-arm/smbfs_2.2.3a-15_arm.deb stable/main/binary-arm/winbind_2.2.3a-15_arm.deb stable/main/source/samba_2.2.3a-15.dsc stable/main/binary-all/samba-doc_2.2.3a-15_all.deb samba (2.2.3a-15) stable-security; urgency=medium * Acknowledge the Security Team's NMUs; thanks again for all your work, Joey. * Fix a rounding error introduced in the patch to bitmap_alloc() that causes crashes on reload. Closes: #302378. [src/bitmap.c] stable/main/binary-sparc/qpopper_4.0.4-2.woody.5_sparc.deb stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.5_sparc.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-s390/qpopper_4.0.4-2.woody.5_s390.deb stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.5_s390.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-powerpc/qpopper_4.0.4-2.woody.5_powerpc.deb stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.5_powerpc.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-mipsel/qpopper_4.0.4-2.woody.5_mipsel.deb stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.5_mipsel.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-mips/qpopper_4.0.4-2.woody.5_mips.deb stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.5_mips.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.5_m68k.deb stable/main/binary-m68k/qpopper_4.0.4-2.woody.5_m68k.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-ia64/qpopper_4.0.4-2.woody.5_ia64.deb stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.5_ia64.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-hppa/qpopper_4.0.4-2.woody.5_hppa.deb stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.5_hppa.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.5_arm.deb stable/main/binary-arm/qpopper_4.0.4-2.woody.5_arm.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.5_alpha.deb stable/main/binary-alpha/qpopper_4.0.4-2.woody.5_alpha.deb qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/source/qpopper_4.0.4-2.woody.5.diff.gz stable/main/binary-i386/qpopper_4.0.4-2.woody.5_i386.deb stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.5_i386.deb stable/main/source/qpopper_4.0.4-2.woody.5.dsc qpopper (4.0.4-2.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix unauthorised file read access [popper/pop_config.c, CAN-2005-1151] * Backported upstream patch to fix unauthorised file write access [popper/popauth.c, CAN-2005-1151] * Applied upstream patch to ensure that no group- or world-readable files are created [popper/popauth.c, CAN-2005-1152] stable/main/binary-sparc/prozilla_1.3.6-3woody2_sparc.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-s390/prozilla_1.3.6-3woody2_s390.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-powerpc/prozilla_1.3.6-3woody2_powerpc.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-mips/prozilla_1.3.6-3woody2_mips.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-m68k/prozilla_1.3.6-3woody2_m68k.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-ia64/prozilla_1.3.6-3woody2_ia64.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-i386/prozilla_1.3.6-3woody2_i386.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-hppa/prozilla_1.3.6-3woody2_hppa.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-arm/prozilla_1.3.6-3woody2_arm.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-alpha/prozilla_1.3.6-3woody2_alpha.deb prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-mipsel/prozilla_1.3.6-3woody2_mipsel.deb stable/main/source/prozilla_1.3.6-3woody2.diff.gz stable/main/source/prozilla_1.3.6-3woody2.dsc prozilla (1:1.3.6-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix format string vulnerability [src/curses.c. src/interface.h, CAN-2005-0523] stable/main/binary-sparc/ppxp-x11_0.2001080415-6woody2_sparc.deb stable/main/binary-sparc/ppxp_0.2001080415-6woody2_sparc.deb stable/main/binary-sparc/ppxp-dev_0.2001080415-6woody2_sparc.deb stable/main/binary-sparc/ppxp-tcltk_0.2001080415-6woody2_sparc.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-s390/ppxp-x11_0.2001080415-6woody2_s390.deb stable/main/binary-s390/ppxp_0.2001080415-6woody2_s390.deb stable/main/binary-s390/ppxp-dev_0.2001080415-6woody2_s390.deb stable/main/binary-s390/ppxp-tcltk_0.2001080415-6woody2_s390.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-powerpc/ppxp-dev_0.2001080415-6woody2_powerpc.deb stable/main/binary-powerpc/ppxp-x11_0.2001080415-6woody2_powerpc.deb stable/main/binary-powerpc/ppxp-tcltk_0.2001080415-6woody2_powerpc.deb stable/main/binary-powerpc/ppxp_0.2001080415-6woody2_powerpc.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-mipsel/ppxp-x11_0.2001080415-6woody2_mipsel.deb stable/main/binary-mipsel/ppxp-tcltk_0.2001080415-6woody2_mipsel.deb stable/main/binary-mipsel/ppxp_0.2001080415-6woody2_mipsel.deb stable/main/binary-mipsel/ppxp-dev_0.2001080415-6woody2_mipsel.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-mips/ppxp-tcltk_0.2001080415-6woody2_mips.deb stable/main/binary-mips/ppxp-dev_0.2001080415-6woody2_mips.deb stable/main/binary-mips/ppxp-x11_0.2001080415-6woody2_mips.deb stable/main/binary-mips/ppxp_0.2001080415-6woody2_mips.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-m68k/ppxp-dev_0.2001080415-6woody2_m68k.deb stable/main/binary-m68k/ppxp-tcltk_0.2001080415-6woody2_m68k.deb stable/main/binary-m68k/ppxp_0.2001080415-6woody2_m68k.deb stable/main/binary-m68k/ppxp-x11_0.2001080415-6woody2_m68k.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-ia64/ppxp-x11_0.2001080415-6woody2_ia64.deb stable/main/binary-ia64/ppxp-dev_0.2001080415-6woody2_ia64.deb stable/main/binary-ia64/ppxp_0.2001080415-6woody2_ia64.deb stable/main/binary-ia64/ppxp-tcltk_0.2001080415-6woody2_ia64.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-hppa/ppxp-x11_0.2001080415-6woody2_hppa.deb stable/main/binary-hppa/ppxp_0.2001080415-6woody2_hppa.deb stable/main/binary-hppa/ppxp-tcltk_0.2001080415-6woody2_hppa.deb stable/main/binary-hppa/ppxp-dev_0.2001080415-6woody2_hppa.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-arm/ppxp-tcltk_0.2001080415-6woody2_arm.deb stable/main/binary-arm/ppxp_0.2001080415-6woody2_arm.deb stable/main/binary-arm/ppxp-x11_0.2001080415-6woody2_arm.deb stable/main/binary-arm/ppxp-dev_0.2001080415-6woody2_arm.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-alpha/ppxp-x11_0.2001080415-6woody2_alpha.deb stable/main/binary-alpha/ppxp-dev_0.2001080415-6woody2_alpha.deb stable/main/binary-alpha/ppxp-tcltk_0.2001080415-6woody2_alpha.deb stable/main/binary-alpha/ppxp_0.2001080415-6woody2_alpha.deb ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-i386/ppxp_0.2001080415-6woody2_i386.deb stable/main/binary-i386/ppxp-x11_0.2001080415-6woody2_i386.deb stable/main/binary-i386/ppxp-dev_0.2001080415-6woody2_i386.deb stable/main/binary-i386/ppxp-tcltk_0.2001080415-6woody2_i386.deb stable/main/source/ppxp_0.2001080415-6woody2.diff.gz stable/main/source/ppxp_0.2001080415-6woody2.dsc ppxp (0.2001080415-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed chown() call which is superflous after dropping privileges [src/console.c, CAN-2005-0392] stable/main/binary-all/phpsysinfo_2.0-3woody2_all.deb stable/main/source/phpsysinfo_2.0-3woody2.dsc stable/main/source/phpsysinfo_2.0-3woody2.diff.gz phpsysinfo (2.0-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added precaution to prevent include files to be executed on their own [includes/system_footer.php, includes/system_header.php, CAN-2005-0870] stable/main/binary-sparc/php4-imap_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-mysql_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-gd_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-7.woody4_sparc.deb stable/main/binary-sparc/php4_4.1.2-7.woody4_sparc.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-s390/php4-mhash_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-gd_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-mcal_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-imap_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-curl_4.1.2-7.woody4_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-recode_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-7.woody4_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-7.woody4_s390.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-powerpc/php4-ldap_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-gd_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-7.woody4_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.1.2-7.woody4_powerpc.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-mipsel/php4-gd_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4-recode_4.1.2-7.woody4_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-7.woody4_mipsel.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-mips/php4-sybase_4.1.2-7.woody4_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-imap_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-gd_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-cgi_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-curl_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-domxml_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-mhash_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-recode_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-7.woody4_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-7.woody4_mips.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-m68k/php4-sybase_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/caudium-php4_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-7.woody4_m68k.deb stable/main/binary-m68k/php4-curl_4.1.2-7.woody4_m68k.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-ia64/php4-gd_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-snmp_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-odbc_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-7.woody4_ia64.deb stable/main/binary-ia64/php4-xslt_4.1.2-7.woody4_ia64.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-i386/php4-mysql_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-xslt_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-ldap_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-curl_4.1.2-7.woody4_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-mcal_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-mhash_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-gd_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-imap_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-snmp_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-recode_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-7.woody4_i386.deb stable/main/binary-i386/php4-cgi_4.1.2-7.woody4_i386.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-arm/php4-odbc_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-recode_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-gd_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-curl_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-7.woody4_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-imap_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4-mhash_4.1.2-7.woody4_arm.deb stable/main/binary-arm/php4_4.1.2-7.woody4_arm.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-alpha/php4-mhash_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-imap_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-mcal_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-ldap_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-7.woody4_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-7.woody4_alpha.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-hppa/php4-mysql_4.1.2-7.woody4_hppa.deb stable/main/source/php4_4.1.2-7.woody4.dsc stable/main/binary-hppa/php4-sybase_4.1.2-7.woody4_hppa.deb stable/main/source/php4_4.1.2-7.woody4.diff.gz stable/main/binary-hppa/php4-cgi_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-mcal_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4_4.1.2-7.woody4_hppa.deb stable/main/binary-all/php4-pear_4.1.2-7.woody4_all.deb stable/main/binary-hppa/php4-gd_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-imap_4.1.2-7.woody4_hppa.deb stable/main/binary-all/php4-dev_4.1.2-7.woody4_all.deb stable/main/binary-hppa/php4-odbc_4.1.2-7.woody4_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-7.woody4_hppa.deb php4 (4:4.1.2-7.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload to get the architectures in sync (i386 buildd didn't upload properly) stable/main/binary-arm/telnetd_0.17-18woody3_arm.deb stable/main/binary-arm/telnet_0.17-18woody3_arm.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-sparc/mysql-client_3.23.49-8.13_sparc.deb stable/main/binary-sparc/mysql-server_3.23.49-8.13_sparc.deb stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.13_sparc.deb stable/main/binary-sparc/libmysqlclient10_3.23.49-8.13_sparc.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-s390/mysql-server_3.23.49-8.13_s390.deb stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.13_s390.deb stable/main/binary-s390/libmysqlclient10_3.23.49-8.13_s390.deb stable/main/binary-s390/mysql-client_3.23.49-8.13_s390.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.13_powerpc.deb stable/main/binary-powerpc/mysql-server_3.23.49-8.13_powerpc.deb stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.13_powerpc.deb stable/main/binary-powerpc/mysql-client_3.23.49-8.13_powerpc.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-mipsel/mysql-client_3.23.49-8.13_mipsel.deb stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.13_mipsel.deb stable/main/binary-mipsel/mysql-server_3.23.49-8.13_mipsel.deb stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.13_mipsel.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.13_mips.deb stable/main/binary-mips/mysql-server_3.23.49-8.13_mips.deb stable/main/binary-mips/libmysqlclient10_3.23.49-8.13_mips.deb stable/main/binary-mips/mysql-client_3.23.49-8.13_mips.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-m68k/mysql-server_3.23.49-8.13_m68k.deb stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.13_m68k.deb stable/main/binary-m68k/mysql-client_3.23.49-8.13_m68k.deb stable/main/binary-m68k/libmysqlclient10_3.23.49-8.13_m68k.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-ia64/mysql-server_3.23.49-8.13_ia64.deb stable/main/binary-ia64/libmysqlclient10_3.23.49-8.13_ia64.deb stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.13_ia64.deb stable/main/binary-ia64/mysql-client_3.23.49-8.13_ia64.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-hppa/mysql-client_3.23.49-8.13_hppa.deb stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.13_hppa.deb stable/main/binary-hppa/libmysqlclient10_3.23.49-8.13_hppa.deb stable/main/binary-hppa/mysql-server_3.23.49-8.13_hppa.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-arm/mysql-client_3.23.49-8.13_arm.deb stable/main/binary-arm/libmysqlclient10_3.23.49-8.13_arm.deb stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.13_arm.deb stable/main/binary-arm/mysql-server_3.23.49-8.13_arm.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-alpha/mysql-server_3.23.49-8.13_alpha.deb stable/main/binary-alpha/libmysqlclient10_3.23.49-8.13_alpha.deb stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.13_alpha.deb stable/main/binary-alpha/mysql-client_3.23.49-8.13_alpha.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-i386/mysql-client_3.23.49-8.13_i386.deb stable/main/binary-i386/libmysqlclient10_3.23.49-8.13_i386.deb stable/main/source/mysql_3.23.49-8.13.diff.gz stable/main/source/mysql_3.23.49-8.13.dsc stable/main/binary-all/mysql-common_3.23.49-8.13_all.deb stable/main/binary-i386/mysql-server_3.23.49-8.13_i386.deb stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.13_i386.deb mysql (3.23.49-8.13) stable; urgency=high * In the corner case that someone upgrades from woody's version of mysql-server to mysql-server-4.1, and they have the mysql datadir or mysql logdir symlinked to somewhere else, the symlink would be lost. this no longer happens, by having copies of the symlinks being stored (in non-purge removals) in a directory where 4.1 will look for them. * 8.12 was never uploaded, so this version will also address the breakage by the previous security update. stable/main/binary-sparc/lsh-server_1.2.5-2woody3_sparc.deb stable/main/binary-sparc/lsh-client_1.2.5-2woody3_sparc.deb stable/main/binary-sparc/lsh-utils_1.2.5-2woody3_sparc.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-s390/lsh-server_1.2.5-2woody3_s390.deb stable/main/binary-s390/lsh-client_1.2.5-2woody3_s390.deb stable/main/binary-s390/lsh-utils_1.2.5-2woody3_s390.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-powerpc/lsh-client_1.2.5-2woody3_powerpc.deb stable/main/binary-powerpc/lsh-utils_1.2.5-2woody3_powerpc.deb stable/main/binary-powerpc/lsh-server_1.2.5-2woody3_powerpc.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-mipsel/lsh-client_1.2.5-2woody3_mipsel.deb stable/main/binary-mipsel/lsh-utils_1.2.5-2woody3_mipsel.deb stable/main/binary-mipsel/lsh-server_1.2.5-2woody3_mipsel.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-mips/lsh-server_1.2.5-2woody3_mips.deb stable/main/binary-mips/lsh-utils_1.2.5-2woody3_mips.deb stable/main/binary-mips/lsh-client_1.2.5-2woody3_mips.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-m68k/lsh-utils_1.2.5-2woody3_m68k.deb stable/main/binary-m68k/lsh-server_1.2.5-2woody3_m68k.deb stable/main/binary-m68k/lsh-client_1.2.5-2woody3_m68k.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-hppa/lsh-server_1.2.5-2woody3_hppa.deb stable/main/binary-hppa/lsh-client_1.2.5-2woody3_hppa.deb stable/main/binary-hppa/lsh-utils_1.2.5-2woody3_hppa.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-arm/lsh-utils_1.2.5-2woody3_arm.deb stable/main/binary-arm/lsh-server_1.2.5-2woody3_arm.deb stable/main/binary-arm/lsh-client_1.2.5-2woody3_arm.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-alpha/lsh-server_1.2.5-2woody3_alpha.deb stable/main/binary-alpha/lsh-utils_1.2.5-2woody3_alpha.deb stable/main/binary-alpha/lsh-client_1.2.5-2woody3_alpha.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-i386/lsh-server_1.2.5-2woody3_i386.deb stable/main/binary-i386/lsh-utils_1.2.5-2woody3_i386.deb stable/main/source/lsh-utils_1.2.5-2woody3.dsc stable/main/binary-i386/lsh-client_1.2.5-2woody3_i386.deb stable/main/source/lsh-utils_1.2.5-2woody3.diff.gz stable/main/binary-all/lsh-utils-doc_1.2.5-2woody3_all.deb lsh-utils (1.2.5-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * The previous upload had the incorrect CVE ID, the denial of service attack is correctly referred to as [CAN-2005-0814] stable/main/binary-sparc/libexif5_0.5.0-1woody1_sparc.deb stable/main/binary-sparc/libexif-dev_0.5.0-1woody1_sparc.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-s390/libexif5_0.5.0-1woody1_s390.deb stable/main/binary-s390/libexif-dev_0.5.0-1woody1_s390.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-powerpc/libexif5_0.5.0-1woody1_powerpc.deb stable/main/binary-powerpc/libexif-dev_0.5.0-1woody1_powerpc.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-mipsel/libexif5_0.5.0-1woody1_mipsel.deb stable/main/binary-mipsel/libexif-dev_0.5.0-1woody1_mipsel.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-mips/libexif5_0.5.0-1woody1_mips.deb stable/main/binary-mips/libexif-dev_0.5.0-1woody1_mips.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-m68k/libexif-dev_0.5.0-1woody1_m68k.deb stable/main/binary-m68k/libexif5_0.5.0-1woody1_m68k.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-ia64/libexif5_0.5.0-1woody1_ia64.deb stable/main/binary-ia64/libexif-dev_0.5.0-1woody1_ia64.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-i386/libexif-dev_0.5.0-1woody1_i386.deb stable/main/binary-i386/libexif5_0.5.0-1woody1_i386.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-hppa/libexif5_0.5.0-1woody1_hppa.deb stable/main/binary-hppa/libexif-dev_0.5.0-1woody1_hppa.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-alpha/libexif-dev_0.5.0-1woody1_alpha.deb stable/main/binary-alpha/libexif5_0.5.0-1woody1_alpha.deb libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/source/libexif_0.5.0-1woody1.dsc stable/main/binary-arm/libexif5_0.5.0-1woody1_arm.deb stable/main/binary-arm/libexif-dev_0.5.0-1woody1_arm.deb stable/main/source/libexif_0.5.0-1woody1.diff.gz libexif (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Sylvain Defresne, partially also present in upstream CVS [libexif/exif-data.c, CAN-2005-0664] stable/main/binary-sparc/libconvert-uulib-perl_0.201-2woody1_sparc.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-s390/libconvert-uulib-perl_0.201-2woody1_s390.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-powerpc/libconvert-uulib-perl_0.201-2woody1_powerpc.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-mipsel/libconvert-uulib-perl_0.201-2woody1_mipsel.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-mips/libconvert-uulib-perl_0.201-2woody1_mips.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-m68k/libconvert-uulib-perl_0.201-2woody1_m68k.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-ia64/libconvert-uulib-perl_0.201-2woody1_ia64.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-i386/libconvert-uulib-perl_0.201-2woody1_i386.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-hppa/libconvert-uulib-perl_0.201-2woody1_hppa.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-alpha/libconvert-uulib-perl_0.201-2woody1_alpha.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/source/libconvert-uulib-perl_0.201-2woody1.dsc stable/main/source/libconvert-uulib-perl_0.201-2woody1.diff.gz stable/main/binary-arm/libconvert-uulib-perl_0.201-2woody1_arm.deb libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c, CAN-2005-1349] stable/main/binary-sparc/libarts_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.14_sparc.deb stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.14_sparc.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libarts_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.14_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.14_s390.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-powerpc/libkmid_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.14_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.14_powerpc.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.14_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.14_mipsel.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-mips/kdelibs3_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.14_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.14_mips.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libkmid_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.14_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.14_m68k.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/libkmid_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.14_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.14_ia64.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/libkmid_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/libarts_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.14_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.14_i386.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.14_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.14_hppa.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-alpha/libarts_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.14_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.14_alpha.deb kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-arm/libarts-dev_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.14_arm.deb stable/main/source/kdelibs_2.2.2-13.woody.14.dsc stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/libarts_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.14_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.14_arm.deb stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.14_all.deb stable/main/source/kdelibs_2.2.2-13.woody.14.diff.gz kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix integer overflow [kimgio/xview.cpp, CAN-2005-1046] * Backported upstream patch to prevent the use of unallocated memory in an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp] stable/main/binary-sparc/junkbuster_2.0.2-0.2woody1_sparc.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-s390/junkbuster_2.0.2-0.2woody1_s390.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-powerpc/junkbuster_2.0.2-0.2woody1_powerpc.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-mipsel/junkbuster_2.0.2-0.2woody1_mipsel.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-mips/junkbuster_2.0.2-0.2woody1_mips.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-m68k/junkbuster_2.0.2-0.2woody1_m68k.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-ia64/junkbuster_2.0.2-0.2woody1_ia64.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-i386/junkbuster_2.0.2-0.2woody1_i386.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-hppa/junkbuster_2.0.2-0.2woody1_hppa.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-alpha/junkbuster_2.0.2-0.2woody1_alpha.deb junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/binary-arm/junkbuster_2.0.2-0.2woody1_arm.deb stable/main/source/junkbuster_2.0.2-0.2woody1.dsc stable/main/source/junkbuster_2.0.2-0.2woody1.diff.gz junkbuster (2.0.2-0.2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by James Ranson to fix overwriting of the Referrer variable [filters.c, CAN-2005-1108] * Corrected use of strsav() to prevent a heap overflow error [filters.c, CAN-2005-1109] stable/main/source/info2www_1.2.2.9-20woody1.diff.gz stable/main/source/info2www_1.2.2.9-20woody1.dsc stable/main/binary-all/info2www_1.2.2.9-20woody1_all.deb info2www (1.2.2.9-20woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Uwe Hermann and Justin Pryzby to fix a cross-site scripting vulnerability [info2www, CAN-2004-1341] stable/main/binary-sparc/libgtkhtml-dev_1.0.2-1.woody1_sparc.deb stable/main/binary-sparc/gtkhtml_1.0.2-1.woody1_sparc.deb stable/main/binary-sparc/libgtkhtml20_1.0.2-1.woody1_sparc.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-s390/libgtkhtml20_1.0.2-1.woody1_s390.deb stable/main/binary-s390/gtkhtml_1.0.2-1.woody1_s390.deb stable/main/binary-s390/libgtkhtml-dev_1.0.2-1.woody1_s390.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-powerpc/gtkhtml_1.0.2-1.woody1_powerpc.deb stable/main/binary-powerpc/libgtkhtml-dev_1.0.2-1.woody1_powerpc.deb stable/main/binary-powerpc/libgtkhtml20_1.0.2-1.woody1_powerpc.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-mipsel/libgtkhtml20_1.0.2-1.woody1_mipsel.deb stable/main/binary-mipsel/libgtkhtml-dev_1.0.2-1.woody1_mipsel.deb stable/main/binary-mipsel/gtkhtml_1.0.2-1.woody1_mipsel.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-mips/libgtkhtml20_1.0.2-1.woody1_mips.deb stable/main/binary-mips/gtkhtml_1.0.2-1.woody1_mips.deb stable/main/binary-mips/libgtkhtml-dev_1.0.2-1.woody1_mips.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-m68k/gtkhtml_1.0.2-1.woody1_m68k.deb stable/main/binary-m68k/libgtkhtml20_1.0.2-1.woody1_m68k.deb stable/main/binary-m68k/libgtkhtml-dev_1.0.2-1.woody1_m68k.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-ia64/libgtkhtml20_1.0.2-1.woody1_ia64.deb stable/main/binary-ia64/libgtkhtml-dev_1.0.2-1.woody1_ia64.deb stable/main/binary-ia64/gtkhtml_1.0.2-1.woody1_ia64.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-i386/libgtkhtml-dev_1.0.2-1.woody1_i386.deb stable/main/binary-i386/gtkhtml_1.0.2-1.woody1_i386.deb stable/main/binary-i386/libgtkhtml20_1.0.2-1.woody1_i386.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-hppa/gtkhtml_1.0.2-1.woody1_hppa.deb stable/main/binary-hppa/libgtkhtml20_1.0.2-1.woody1_hppa.deb stable/main/binary-hppa/libgtkhtml-dev_1.0.2-1.woody1_hppa.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-alpha/libgtkhtml20_1.0.2-1.woody1_alpha.deb stable/main/binary-alpha/libgtkhtml-dev_1.0.2-1.woody1_alpha.deb stable/main/binary-alpha/gtkhtml_1.0.2-1.woody1_alpha.deb gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-all/libgtkhtml-data_1.0.2-1.woody1_all.deb stable/main/binary-arm/libgtkhtml-dev_1.0.2-1.woody1_arm.deb stable/main/binary-arm/libgtkhtml20_1.0.2-1.woody1_arm.deb stable/main/source/gtkhtml_1.0.2-1.woody1.diff.gz stable/main/binary-arm/gtkhtml_1.0.2-1.woody1_arm.deb stable/main/source/gtkhtml_1.0.2-1.woody1.dsc gtkhtml (1.0.2-1.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Mandrake patch to fix denial of service [src/htmltextslave.c, CAN-2003-0541] stable/main/binary-sparc/gwtp_4.06-2woody1_sparc.deb stable/main/binary-sparc/geneweb_4.06-2woody1_sparc.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-s390/geneweb_4.06-2woody1_s390.deb stable/main/binary-s390/gwtp_4.06-2woody1_s390.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-powerpc/gwtp_4.06-2woody1_powerpc.deb stable/main/binary-powerpc/geneweb_4.06-2woody1_powerpc.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-mipsel/geneweb_4.06-2woody1_mipsel.deb stable/main/binary-mipsel/gwtp_4.06-2woody1_mipsel.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-mips/geneweb_4.06-2woody1_mips.deb stable/main/binary-mips/gwtp_4.06-2woody1_mips.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-m68k/gwtp_4.06-2woody1_m68k.deb stable/main/binary-m68k/geneweb_4.06-2woody1_m68k.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-ia64/geneweb_4.06-2woody1_ia64.deb stable/main/binary-ia64/gwtp_4.06-2woody1_ia64.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-i386/gwtp_4.06-2woody1_i386.deb stable/main/binary-i386/geneweb_4.06-2woody1_i386.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-hppa/geneweb_4.06-2woody1_hppa.deb stable/main/binary-hppa/gwtp_4.06-2woody1_hppa.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-alpha/geneweb_4.06-2woody1_alpha.deb stable/main/binary-alpha/gwtp_4.06-2woody1_alpha.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-arm/geneweb_4.06-2woody1_arm.deb stable/main/source/geneweb_4.06-2woody1.diff.gz stable/main/source/geneweb_4.06-2woody1.dsc stable/main/binary-arm/gwtp_4.06-2woody1_arm.deb geneweb (4.06-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed automatic conversion of older .gwb database files that turned out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405] stable/main/binary-sparc/gaim-common_0.58-2.5_sparc.deb stable/main/binary-sparc/gaim_0.58-2.5_sparc.deb stable/main/binary-sparc/gaim-gnome_0.58-2.5_sparc.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-s390/gaim-gnome_0.58-2.5_s390.deb stable/main/binary-s390/gaim_0.58-2.5_s390.deb stable/main/binary-s390/gaim-common_0.58-2.5_s390.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-powerpc/gaim-common_0.58-2.5_powerpc.deb stable/main/binary-powerpc/gaim-gnome_0.58-2.5_powerpc.deb stable/main/binary-powerpc/gaim_0.58-2.5_powerpc.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-mips/gaim_0.58-2.5_mips.deb stable/main/binary-mips/gaim-common_0.58-2.5_mips.deb stable/main/binary-mips/gaim-gnome_0.58-2.5_mips.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-m68k/gaim-gnome_0.58-2.5_m68k.deb stable/main/binary-m68k/gaim_0.58-2.5_m68k.deb stable/main/binary-m68k/gaim-common_0.58-2.5_m68k.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-ia64/gaim-gnome_0.58-2.5_ia64.deb stable/main/binary-ia64/gaim-common_0.58-2.5_ia64.deb stable/main/binary-ia64/gaim_0.58-2.5_ia64.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-i386/gaim-common_0.58-2.5_i386.deb stable/main/binary-i386/gaim_0.58-2.5_i386.deb stable/main/binary-i386/gaim-gnome_0.58-2.5_i386.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-hppa/gaim_0.58-2.5_hppa.deb stable/main/binary-hppa/gaim-gnome_0.58-2.5_hppa.deb stable/main/binary-hppa/gaim-common_0.58-2.5_hppa.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-arm/gaim_0.58-2.5_arm.deb stable/main/binary-arm/gaim-gnome_0.58-2.5_arm.deb stable/main/binary-arm/gaim-common_0.58-2.5_arm.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-alpha/gaim_0.58-2.5_alpha.deb stable/main/binary-alpha/gaim-gnome_0.58-2.5_alpha.deb stable/main/binary-alpha/gaim-common_0.58-2.5_alpha.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/source/gaim_0.58-2.5.diff.gz stable/main/binary-mipsel/gaim-common_0.58-2.5_mipsel.deb stable/main/binary-mipsel/gaim_0.58-2.5_mipsel.deb stable/main/source/gaim_0.58-2.5.dsc stable/main/binary-mipsel/gaim-gnome_0.58-2.5_mipsel.deb gaim (1:0.58-2.5) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied backported upstream patch to fix denial of service [src/protocols/oscar/aim.h, src/protocols/oscar/im.c, src/protocols/oscar/rxqueue.c, CAN-2005-0472] * Thanks a lot to Robert McQueen stable/main/binary-sparc/f2c_20010821-3.2_sparc.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-s390/f2c_20010821-3.2_s390.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-powerpc/f2c_20010821-3.2_powerpc.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-mipsel/f2c_20010821-3.2_mipsel.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-mips/f2c_20010821-3.2_mips.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-m68k/f2c_20010821-3.2_m68k.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-ia64/f2c_20010821-3.2_ia64.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-i386/f2c_20010821-3.2_i386.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-hppa/f2c_20010821-3.2_hppa.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-alpha/f2c_20010821-3.2_alpha.deb f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-arm/f2c_20010821-3.2_arm.deb stable/main/source/f2c_20010821-3.2.dsc stable/main/source/f2c_20010821-3.2.diff.gz f2c (20010821-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to create proper temporary files by not shadowing global scope variables with local scope ones. Thanks to Dan McMahill from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] stable/main/binary-sparc/tethereal_0.9.4-1woody12_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody12_sparc.deb stable/main/binary-sparc/ethereal-dev_0.9.4-1woody12_sparc.deb stable/main/binary-sparc/ethereal_0.9.4-1woody12_sparc.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-s390/ethereal_0.9.4-1woody12_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody12_s390.deb stable/main/binary-s390/ethereal-common_0.9.4-1woody12_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody12_s390.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-powerpc/ethereal-common_0.9.4-1woody12_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody12_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody12_powerpc.deb stable/main/binary-powerpc/ethereal_0.9.4-1woody12_powerpc.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-mips/ethereal-common_0.9.4-1woody12_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody12_mips.deb stable/main/binary-mips/ethereal-dev_0.9.4-1woody12_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody12_mips.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-m68k/ethereal-dev_0.9.4-1woody12_m68k.deb stable/main/binary-m68k/ethereal_0.9.4-1woody12_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody12_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody12_m68k.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-ia64/ethereal_0.9.4-1woody12_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody12_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody12_ia64.deb stable/main/binary-ia64/tethereal_0.9.4-1woody12_ia64.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-i386/tethereal_0.9.4-1woody12_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody12_i386.deb stable/main/binary-i386/ethereal_0.9.4-1woody12_i386.deb stable/main/binary-i386/ethereal-common_0.9.4-1woody12_i386.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-hppa/ethereal-common_0.9.4-1woody12_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody12_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody12_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody12_hppa.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-arm/ethereal_0.9.4-1woody12_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody12_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody12_arm.deb stable/main/binary-arm/ethereal-common_0.9.4-1woody12_arm.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-alpha/ethereal_0.9.4-1woody12_alpha.deb stable/main/binary-alpha/ethereal-dev_0.9.4-1woody12_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody12_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody12_alpha.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/binary-mipsel/ethereal_0.9.4-1woody12_mipsel.deb stable/main/source/ethereal_0.9.4-1woody12.dsc stable/main/source/ethereal_0.9.4-1woody12.diff.gz stable/main/binary-mipsel/tethereal_0.9.4-1woody12_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.9.4-1woody12_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody12_mipsel.deb ethereal (0.9.4-1woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in the IAPP dissector [packet-iapp.c, CAN-2005-0739] stable/main/source/doc-base_0.7.11-0.woody1.dsc stable/main/source/doc-base_0.7.11-0.woody1.tar.gz stable/main/binary-all/doc-base_0.7.11-0.woody1_all.deb doc-base (0.7.11-0.woody1) stable; urgency=low * Non-maintainer upload by the release team. * Backport the following patch by Steve Langasek and Colin Watson to woody: * Fix install-docs to not require perl's File::Basename, so that it works even when perl is unconfigured. See #278495. stable/main/binary-sparc/cvs_1.11.1p1debian-10_sparc.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-s390/cvs_1.11.1p1debian-10_s390.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-powerpc/cvs_1.11.1p1debian-10_powerpc.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-mipsel/cvs_1.11.1p1debian-10_mipsel.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-mips/cvs_1.11.1p1debian-10_mips.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-m68k/cvs_1.11.1p1debian-10_m68k.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-ia64/cvs_1.11.1p1debian-10_ia64.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-i386/cvs_1.11.1p1debian-10_i386.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-hppa/cvs_1.11.1p1debian-10_hppa.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-alpha/cvs_1.11.1p1debian-10_alpha.deb cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-arm/cvs_1.11.1p1debian-10_arm.deb stable/main/source/cvs_1.11.1p1debian-10.diff.gz stable/main/source/cvs_1.11.1p1debian-10.dsc cvs (1.11.1p1debian-10) stable-security; urgency=high * Fixes to the cvs-repouid changes: + Make sure user passwords are still checked if the cvs-repouids file exists. Closes: #260200, CAN-2004-1342 + Fix potential crash if the cvs-repouids file exists but does not contain a mapping for the current repository, CAN-2004-1343 + debian/patches/80_cvs-repouid-0.1 stable/main/binary-sparc/libbz2-dev_1.0.2-1.woody2_sparc.deb stable/main/binary-sparc/libbz2-1.0_1.0.2-1.woody2_sparc.deb stable/main/binary-sparc/bzip2_1.0.2-1.woody2_sparc.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-s390/bzip2_1.0.2-1.woody2_s390.deb stable/main/binary-s390/libbz2-1.0_1.0.2-1.woody2_s390.deb stable/main/binary-s390/libbz2-dev_1.0.2-1.woody2_s390.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-powerpc/bzip2_1.0.2-1.woody2_powerpc.deb stable/main/binary-powerpc/libbz2-dev_1.0.2-1.woody2_powerpc.deb stable/main/binary-powerpc/libbz2-1.0_1.0.2-1.woody2_powerpc.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-mipsel/bzip2_1.0.2-1.woody2_mipsel.deb stable/main/binary-mipsel/libbz2-dev_1.0.2-1.woody2_mipsel.deb stable/main/binary-mipsel/libbz2-1.0_1.0.2-1.woody2_mipsel.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-mips/bzip2_1.0.2-1.woody2_mips.deb stable/main/binary-mips/libbz2-1.0_1.0.2-1.woody2_mips.deb stable/main/binary-mips/libbz2-dev_1.0.2-1.woody2_mips.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-m68k/bzip2_1.0.2-1.woody2_m68k.deb stable/main/binary-m68k/libbz2-dev_1.0.2-1.woody2_m68k.deb stable/main/binary-m68k/libbz2-1.0_1.0.2-1.woody2_m68k.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-ia64/bzip2_1.0.2-1.woody2_ia64.deb stable/main/binary-ia64/libbz2-1.0_1.0.2-1.woody2_ia64.deb stable/main/binary-ia64/libbz2-dev_1.0.2-1.woody2_ia64.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-hppa/libbz2-dev_1.0.2-1.woody2_hppa.deb stable/main/binary-hppa/bzip2_1.0.2-1.woody2_hppa.deb stable/main/binary-hppa/libbz2-1.0_1.0.2-1.woody2_hppa.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-arm/libbz2-1.0_1.0.2-1.woody2_arm.deb stable/main/binary-arm/libbz2-dev_1.0.2-1.woody2_arm.deb stable/main/binary-arm/bzip2_1.0.2-1.woody2_arm.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-alpha/bzip2_1.0.2-1.woody2_alpha.deb stable/main/binary-alpha/libbz2-1.0_1.0.2-1.woody2_alpha.deb stable/main/binary-alpha/libbz2-dev_1.0.2-1.woody2_alpha.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! stable/main/binary-i386/libbz2-dev_1.0.2-1.woody2_i386.deb stable/main/binary-i386/libbz2-1.0_1.0.2-1.woody2_i386.deb stable/main/source/bzip2_1.0.2-1.woody2.dsc stable/main/source/bzip2_1.0.2-1.woody2.diff.gz stable/main/binary-i386/bzip2_1.0.2-1.woody2_i386.deb bzip2 (1.0.2-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild because maintainer prevented distribution of security fix, thanks a lot! ========================================= Fri, 15 Apr 2005 - Debian 3.0r5 released ========================================= ========================================================================= [Date: Fri, 15 Apr 2005 18:25:38 -0400] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: eemu | 2.34.1-1 | source eemu-client | 2.34.1-1 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390 Closed bugs: 258921 ------------------- Reason ------------------- RoSRM: License violation, Bug#258921 ---------------------------------------------- ========================================================================= [Date: Fri, 15 Apr 2005 18:27:40 -0400] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: gg | 0.2.1-2 | source gg-gnome | 0.2.1-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc gg-gtk | 0.2.1-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc Closed bugs: 257620 ------------------- Reason ------------------- RoSRM: Package can not be used anymore due to protocol changes. Bug#257620 ---------------------------------------------- ========================================================================= [Date: Fri, 15 Apr 2005 18:29:06 -0400] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: gstar | 1.0-6 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc Closed bugs: 252885 ------------------- Reason ------------------- RoSRM: GPL licensed with non-free component, hence not distributable Bug#252885 ---------------------------------------------- ========================================================================= [Date: Fri, 15 Apr 2005 18:30:44 -0400] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: xzx | 2.9.0-1.1 | source, arm, hppa, i386, ia64, m68k, powerpc, s390 xzx | 2.9.0-1.1.1 | alpha Closed bugs: 240941 ------------------- Reason ------------------- RoSRM: Unmodifiable - undistributable. Bug#240941 ---------------------------------------------- ========================================================================= stable/main/binary-sparc/zip_2.30-5woody2_sparc.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-s390/zip_2.30-5woody2_s390.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-powerpc/zip_2.30-5woody2_powerpc.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-mipsel/zip_2.30-5woody2_mipsel.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-mips/zip_2.30-5woody2_mips.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-m68k/zip_2.30-5woody2_m68k.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-ia64/zip_2.30-5woody2_ia64.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-hppa/zip_2.30-5woody2_hppa.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-arm/zip_2.30-5woody2_arm.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-alpha/zip_2.30-5woody2_alpha.deb zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-i386/zip_2.30-5woody2_i386.deb stable/main/source/zip_2.30-5woody2.diff.gz stable/main/source/zip_2.30-5woody2.dsc zip (2.30-5woody2) stable-security; urgency=medium * Fixed buffer overflow in unix.c, which happens when creating archives with very long filenames (Bug #279867). This is CAN-2004-1010. Semi-official patch by Greg Roelofs, long filenames are now supported. stable/main/binary-sparc/zhcon_0.2-4woody3_sparc.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-s390/zhcon_0.2-4woody3_s390.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-powerpc/zhcon_0.2-4woody3_powerpc.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-mips/zhcon_0.2-4woody3_mips.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-m68k/zhcon_0.2-4woody3_m68k.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-ia64/zhcon_0.2-4woody3_ia64.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-i386/zhcon_0.2-4woody3_i386.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-hppa/zhcon_0.2-4woody3_hppa.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-arm/zhcon_0.2-4woody3_arm.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-alpha/zhcon_0.2-4woody3_alpha.deb zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-mipsel/zhcon_0.2-4woody3_mipsel.deb stable/main/source/zhcon_0.2-4woody3.dsc stable/main/source/zhcon_0.2-4woody3.diff.gz zhcon (1:0.2-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to prevent unauthorised file access [src/configfile.cpp, CAN-2005-0072] stable/main/binary-sparc/xviewg_3.2p1.4-16woody2_sparc.deb stable/main/binary-sparc/xviewg-dev_3.2p1.4-16woody2_sparc.deb stable/main/binary-sparc/xview-clients_3.2p1.4-16woody2_sparc.deb stable/main/binary-sparc/olvwm_4.4.3.2p1.4-16woody2_sparc.deb stable/main/binary-sparc/olwm_3.2p1.4-16woody2_sparc.deb stable/main/binary-sparc/xview-examples_3.2p1.4-16woody2_sparc.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-s390/xview-clients_3.2p1.4-16woody2_s390.deb stable/main/binary-s390/olvwm_4.4.3.2p1.4-16woody2_s390.deb stable/main/binary-s390/xview-examples_3.2p1.4-16woody2_s390.deb stable/main/binary-s390/olwm_3.2p1.4-16woody2_s390.deb stable/main/binary-s390/xviewg_3.2p1.4-16woody2_s390.deb stable/main/binary-s390/xviewg-dev_3.2p1.4-16woody2_s390.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-powerpc/xviewg-dev_3.2p1.4-16woody2_powerpc.deb stable/main/binary-powerpc/olwm_3.2p1.4-16woody2_powerpc.deb stable/main/binary-powerpc/xviewg_3.2p1.4-16woody2_powerpc.deb stable/main/binary-powerpc/xview-clients_3.2p1.4-16woody2_powerpc.deb stable/main/binary-powerpc/xview-examples_3.2p1.4-16woody2_powerpc.deb stable/main/binary-powerpc/olvwm_4.4.3.2p1.4-16woody2_powerpc.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-mips/olwm_3.2p1.4-16woody2_mips.deb stable/main/binary-mips/xview-examples_3.2p1.4-16woody2_mips.deb stable/main/binary-mips/xview-clients_3.2p1.4-16woody2_mips.deb stable/main/binary-mips/olvwm_4.4.3.2p1.4-16woody2_mips.deb stable/main/binary-mips/xviewg-dev_3.2p1.4-16woody2_mips.deb stable/main/binary-mips/xviewg_3.2p1.4-16woody2_mips.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-m68k/xviewg_3.2p1.4-16woody2_m68k.deb stable/main/binary-m68k/xviewg-dev_3.2p1.4-16woody2_m68k.deb stable/main/binary-m68k/olvwm_4.4.3.2p1.4-16woody2_m68k.deb stable/main/binary-m68k/olwm_3.2p1.4-16woody2_m68k.deb stable/main/binary-m68k/xview-clients_3.2p1.4-16woody2_m68k.deb stable/main/binary-m68k/xview-examples_3.2p1.4-16woody2_m68k.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-i386/xviewg-dev_3.2p1.4-16woody2_i386.deb stable/main/binary-i386/xview-examples_3.2p1.4-16woody2_i386.deb stable/main/binary-i386/olvwm_4.4.3.2p1.4-16woody2_i386.deb stable/main/binary-i386/olwm_3.2p1.4-16woody2_i386.deb stable/main/binary-i386/xviewg_3.2p1.4-16woody2_i386.deb stable/main/binary-i386/xview-clients_3.2p1.4-16woody2_i386.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-hppa/xviewg-dev_3.2p1.4-16woody2_hppa.deb stable/main/binary-hppa/olwm_3.2p1.4-16woody2_hppa.deb stable/main/binary-hppa/olvwm_4.4.3.2p1.4-16woody2_hppa.deb stable/main/binary-hppa/xview-examples_3.2p1.4-16woody2_hppa.deb stable/main/binary-hppa/xview-clients_3.2p1.4-16woody2_hppa.deb stable/main/binary-hppa/xviewg_3.2p1.4-16woody2_hppa.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-arm/xview-examples_3.2p1.4-16woody2_arm.deb stable/main/binary-arm/xview-clients_3.2p1.4-16woody2_arm.deb stable/main/binary-arm/xviewg-dev_3.2p1.4-16woody2_arm.deb stable/main/binary-arm/olwm_3.2p1.4-16woody2_arm.deb stable/main/binary-arm/olvwm_4.4.3.2p1.4-16woody2_arm.deb stable/main/binary-arm/xviewg_3.2p1.4-16woody2_arm.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-alpha/olwm_3.2p1.4-16woody2_alpha.deb stable/main/binary-alpha/xview-examples_3.2p1.4-16woody2_alpha.deb stable/main/binary-alpha/olvwm_4.4.3.2p1.4-16woody2_alpha.deb stable/main/binary-alpha/xview-clients_3.2p1.4-16woody2_alpha.deb stable/main/binary-alpha/xviewg-dev_3.2p1.4-16woody2_alpha.deb stable/main/binary-alpha/xviewg_3.2p1.4-16woody2_alpha.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/source/xview_3.2p1.4-16woody2.dsc stable/main/binary-mipsel/olvwm_4.4.3.2p1.4-16woody2_mipsel.deb stable/main/source/xview_3.2p1.4-16woody2.diff.gz stable/main/binary-mipsel/xview-clients_3.2p1.4-16woody2_mipsel.deb stable/main/binary-mipsel/xview-examples_3.2p1.4-16woody2_mipsel.deb stable/main/binary-mipsel/olwm_3.2p1.4-16woody2_mipsel.deb stable/main/binary-mipsel/xviewg-dev_3.2p1.4-16woody2_mipsel.deb stable/main/binary-mipsel/xviewg_3.2p1.4-16woody2_mipsel.deb xview (3.2p1.4-16woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076] stable/main/binary-sparc/xtrlock_2.0-6woody2_sparc.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-s390/xtrlock_2.0-6woody2_s390.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-powerpc/xtrlock_2.0-6woody2_powerpc.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-mips/xtrlock_2.0-6woody2_mips.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-m68k/xtrlock_2.0-6woody2_m68k.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-ia64/xtrlock_2.0-6woody2_ia64.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-i386/xtrlock_2.0-6woody2_i386.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-hppa/xtrlock_2.0-6woody2_hppa.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-arm/xtrlock_2.0-6woody2_arm.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-alpha/xtrlock_2.0-6woody2_alpha.deb xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-mipsel/xtrlock_2.0-6woody2_mipsel.deb stable/main/source/xtrlock_2.0-6woody2.dsc stable/main/source/xtrlock_2.0-6woody2.tar.gz xtrlock (2.0-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c, CAN-2005-0079] * Added build dependencies stable/main/binary-sparc/xpdf-utils_1.00-3.4_sparc.deb stable/main/binary-sparc/xpdf-reader_1.00-3.4_sparc.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-s390/xpdf-utils_1.00-3.4_s390.deb stable/main/binary-s390/xpdf-reader_1.00-3.4_s390.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-powerpc/xpdf-utils_1.00-3.4_powerpc.deb stable/main/binary-powerpc/xpdf-reader_1.00-3.4_powerpc.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-mips/xpdf-utils_1.00-3.4_mips.deb stable/main/binary-mips/xpdf-reader_1.00-3.4_mips.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-m68k/xpdf-reader_1.00-3.4_m68k.deb stable/main/binary-m68k/xpdf-utils_1.00-3.4_m68k.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-ia64/xpdf-reader_1.00-3.4_ia64.deb stable/main/binary-ia64/xpdf-utils_1.00-3.4_ia64.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-i386/xpdf-reader_1.00-3.4_i386.deb stable/main/binary-i386/xpdf-utils_1.00-3.4_i386.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-hppa/xpdf-utils_1.00-3.4_hppa.deb stable/main/binary-hppa/xpdf-reader_1.00-3.4_hppa.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-arm/xpdf-reader_1.00-3.4_arm.deb stable/main/binary-arm/xpdf-utils_1.00-3.4_arm.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-alpha/xpdf-reader_1.00-3.4_alpha.deb stable/main/binary-alpha/xpdf-utils_1.00-3.4_alpha.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-all/xpdf_1.00-3.4_all.deb stable/main/binary-all/xpdf-common_1.00-3.4_all.deb stable/main/source/xpdf_1.00-3.4.dsc stable/main/source/xpdf_1.00-3.4.diff.gz stable/main/binary-mipsel/xpdf-reader_1.00-3.4_mipsel.deb stable/main/binary-mipsel/xpdf-utils_1.00-3.4_mipsel.deb xpdf (1.00-3.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [src/Decrypt.cc, CAN-2005-0064] stable/main/binary-sparc/xpcd_2.08-8woody3_sparc.deb stable/main/binary-sparc/xpcd-gimp_2.08-8woody3_sparc.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-s390/xpcd_2.08-8woody3_s390.deb stable/main/binary-s390/xpcd-gimp_2.08-8woody3_s390.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-powerpc/xpcd_2.08-8woody3_powerpc.deb stable/main/binary-powerpc/xpcd-gimp_2.08-8woody3_powerpc.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-mips/xpcd_2.08-8woody3_mips.deb stable/main/binary-mips/xpcd-gimp_2.08-8woody3_mips.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-m68k/xpcd-gimp_2.08-8woody3_m68k.deb stable/main/binary-m68k/xpcd_2.08-8woody3_m68k.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-ia64/xpcd-gimp_2.08-8woody3_ia64.deb stable/main/binary-ia64/xpcd_2.08-8woody3_ia64.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-i386/xpcd-gimp_2.08-8woody3_i386.deb stable/main/binary-i386/xpcd_2.08-8woody3_i386.deb stable/main/binary-i386/xpcd-svga_2.08-8woody3_i386.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-hppa/xpcd_2.08-8woody3_hppa.deb stable/main/binary-hppa/xpcd-gimp_2.08-8woody3_hppa.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-arm/xpcd-gimp_2.08-8woody3_arm.deb stable/main/binary-arm/xpcd_2.08-8woody3_arm.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-alpha/xpcd-gimp_2.08-8woody3_alpha.deb stable/main/binary-alpha/xpcd_2.08-8woody3_alpha.deb xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-mipsel/xpcd-gimp_2.08-8woody3_mipsel.deb stable/main/binary-mipsel/xpcd_2.08-8woody3_mipsel.deb stable/main/source/xpcd_2.08-8woody3.diff.gz stable/main/source/xpcd_2.08-8woody3.dsc xpcd (2.08-8woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflows [test/view.c, test/plug-0.54.c, xpcd/complete.c, CAN-2005-0074] stable/main/binary-sparc/xloadimage_4.1-10woody1_sparc.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-s390/xloadimage_4.1-10woody1_s390.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-powerpc/xloadimage_4.1-10woody1_powerpc.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-mipsel/xloadimage_4.1-10woody1_mipsel.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-mips/xloadimage_4.1-10woody1_mips.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-m68k/xloadimage_4.1-10woody1_m68k.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-ia64/xloadimage_4.1-10woody1_ia64.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-i386/xloadimage_4.1-10woody1_i386.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-hppa/xloadimage_4.1-10woody1_hppa.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-alpha/xloadimage_4.1-10woody1_alpha.deb xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/source/xloadimage_4.1-10woody1.dsc stable/main/binary-arm/xloadimage_4.1-10woody1_arm.deb stable/main/source/xloadimage_4.1-10woody1.diff.gz xloadimage (4.1-10woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch from xli to fix integer overflows [new.c, CAN-2005-0639] * Backported patch from xli upstream to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-sparc/xli_1.17.0-11woody1_sparc.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-s390/xli_1.17.0-11woody1_s390.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-powerpc/xli_1.17.0-11woody1_powerpc.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-mipsel/xli_1.17.0-11woody1_mipsel.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-mips/xli_1.17.0-11woody1_mips.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-m68k/xli_1.17.0-11woody1_m68k.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-ia64/xli_1.17.0-11woody1_ia64.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-i386/xli_1.17.0-11woody1_i386.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-hppa/xli_1.17.0-11woody1_hppa.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-alpha/xli_1.17.0-11woody1_alpha.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/source/xli_1.17.0-11woody1.diff.gz stable/main/source/xli_1.17.0-11woody1.dsc stable/main/binary-arm/xli_1.17.0-11woody1_arm.deb xli (1.17.0-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from DSA 069 to fix buffer overflow in faces decoder [faces.c, CAN-2001-0775] * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639] * Backported upstream patch to add quoting protection to filenames when uncompressing files [zio.c, CAN-2005-0638] stable/main/binary-sparc/libxine0_0.9.8-2woody3_sparc.deb stable/main/binary-sparc/libxine-dev_0.9.8-2woody3_sparc.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/libxine0_0.9.8-2woody3_s390.deb stable/main/binary-s390/libxine-dev_0.9.8-2woody3_s390.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/libxine0_0.9.8-2woody3_powerpc.deb stable/main/binary-powerpc/libxine-dev_0.9.8-2woody3_powerpc.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/libxine-dev_0.9.8-2woody3_mipsel.deb stable/main/binary-mipsel/libxine0_0.9.8-2woody3_mipsel.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/libxine0_0.9.8-2woody3_mips.deb stable/main/binary-mips/libxine-dev_0.9.8-2woody3_mips.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/libxine-dev_0.9.8-2woody3_m68k.deb stable/main/binary-m68k/libxine0_0.9.8-2woody3_m68k.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/libxine-dev_0.9.8-2woody3_ia64.deb stable/main/binary-ia64/libxine0_0.9.8-2woody3_ia64.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/libxine0_0.9.8-2woody3_hppa.deb stable/main/binary-hppa/libxine-dev_0.9.8-2woody3_hppa.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/libxine-dev_0.9.8-2woody3_arm.deb stable/main/binary-arm/libxine0_0.9.8-2woody3_arm.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/libxine-dev_0.9.8-2woody3_alpha.deb stable/main/binary-alpha/libxine0_0.9.8-2woody3_alpha.deb xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/libxine0_0.9.8-2woody3_i386.deb stable/main/binary-i386/libxine-dev_0.9.8-2woody3_i386.deb stable/main/source/xine-lib_0.9.8-2woody3.diff.gz stable/main/source/xine-lib_0.9.8-2woody3.dsc xine-lib (0.9.8-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/xemacs21-bin_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-mule-canna-wnn_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-mule_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-gnome-nomule_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-nomule_21.4.6-8woody2_sparc.deb stable/main/binary-sparc/xemacs21-gnome-mule_21.4.6-8woody2_sparc.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-s390/xemacs21-nomule_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-gnome-mule_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-mule-canna-wnn_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-bin_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-mule_21.4.6-8woody2_s390.deb stable/main/binary-s390/xemacs21-gnome-nomule_21.4.6-8woody2_s390.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-powerpc/xemacs21-bin_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-gnome-nomule_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-gnome-mule_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-mule-canna-wnn_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-mule_21.4.6-8woody2_powerpc.deb stable/main/binary-powerpc/xemacs21-nomule_21.4.6-8woody2_powerpc.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-mipsel/xemacs21-nomule_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-bin_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-mule-canna-wnn_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-gnome-mule_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-mule_21.4.6-8woody2_mipsel.deb stable/main/binary-mipsel/xemacs21-gnome-nomule_21.4.6-8woody2_mipsel.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-mips/xemacs21-bin_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-mule-canna-wnn_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-gnome-mule_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-mule_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-gnome-nomule_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_mips.deb stable/main/binary-mips/xemacs21-nomule_21.4.6-8woody2_mips.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-i386/xemacs21-mule-canna-wnn_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-gnome-mule_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-bin_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-nomule_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-gnome-nomule_21.4.6-8woody2_i386.deb stable/main/binary-i386/xemacs21-mule_21.4.6-8woody2_i386.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-arm/xemacs21-mule_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-bin_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-gnome-nomule_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-gnome-mule_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-mule-canna-wnn_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-nomule_21.4.6-8woody2_arm.deb stable/main/binary-arm/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_arm.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-alpha/xemacs21-nomule_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-gnome-nomule_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-bin_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-mule-canna-wnn_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-gnome-mule_21.4.6-8woody2_alpha.deb stable/main/binary-alpha/xemacs21-mule_21.4.6-8woody2_alpha.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/source/xemacs21_21.4.6-8woody2.dsc stable/main/binary-all/xemacs21_21.4.6-8woody2_all.deb stable/main/binary-ia64/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_ia64.deb stable/main/source/xemacs21_21.4.6-8woody2.diff.gz stable/main/binary-all/xemacs21-supportel_21.4.6-8woody2_all.deb stable/main/binary-ia64/xemacs21-gnome-nomule_21.4.6-8woody2_ia64.deb stable/main/binary-ia64/xemacs21-gnome-mule_21.4.6-8woody2_ia64.deb stable/main/binary-all/xemacs21-support_21.4.6-8woody2_all.deb stable/main/binary-ia64/xemacs21-mule-canna-wnn_21.4.6-8woody2_ia64.deb stable/main/binary-ia64/xemacs21-mule_21.4.6-8woody2_ia64.deb stable/main/binary-ia64/xemacs21-nomule_21.4.6-8woody2_ia64.deb stable/main/binary-ia64/xemacs21-bin_21.4.6-8woody2_ia64.deb xemacs21 (21.4.6-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-sparc/wu-ftpd_2.6.2-3woody5_sparc.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-s390/wu-ftpd_2.6.2-3woody5_s390.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody5_powerpc.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody5_mipsel.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-mips/wu-ftpd_2.6.2-3woody5_mips.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-m68k/wu-ftpd_2.6.2-3woody5_m68k.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-ia64/wu-ftpd_2.6.2-3woody5_ia64.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-i386/wu-ftpd_2.6.2-3woody5_i386.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-hppa/wu-ftpd_2.6.2-3woody5_hppa.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-alpha/wu-ftpd_2.6.2-3woody5_alpha.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody5_all.deb stable/main/source/wu-ftpd_2.6.2-3woody5.dsc stable/main/source/wu-ftpd_2.6.2-3woody5.diff.gz stable/main/binary-arm/wu-ftpd_2.6.2-3woody5_arm.deb wu-ftpd (2.6.2-3woody5) stable-security; urgency=high * Applied patch by Chris Butler to fix denial of service in the NLST command [src/ftpd.c, CAN-2005-0256] * Applied and adjusted patch by Chris Butler to fix denial of service in the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854] stable/main/binary-sparc/libwings-dev_0.80.0-4.2_sparc.deb stable/main/binary-sparc/libwraster2-dev_0.80.0-4.2_sparc.deb stable/main/binary-sparc/libwraster2_0.80.0-4.2_sparc.deb stable/main/binary-sparc/wmaker_0.80.0-4.2_sparc.deb stable/main/binary-sparc/libwmaker0-dev_0.80.0-4.2_sparc.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-s390/libwraster2_0.80.0-4.2_s390.deb stable/main/binary-s390/libwings-dev_0.80.0-4.2_s390.deb stable/main/binary-s390/libwraster2-dev_0.80.0-4.2_s390.deb stable/main/binary-s390/wmaker_0.80.0-4.2_s390.deb stable/main/binary-s390/libwmaker0-dev_0.80.0-4.2_s390.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-powerpc/libwraster2-dev_0.80.0-4.2_powerpc.deb stable/main/binary-powerpc/libwings-dev_0.80.0-4.2_powerpc.deb stable/main/binary-powerpc/libwmaker0-dev_0.80.0-4.2_powerpc.deb stable/main/binary-powerpc/wmaker_0.80.0-4.2_powerpc.deb stable/main/binary-powerpc/libwraster2_0.80.0-4.2_powerpc.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-mips/libwraster2-dev_0.80.0-4.2_mips.deb stable/main/binary-mips/wmaker_0.80.0-4.2_mips.deb stable/main/binary-mips/libwraster2_0.80.0-4.2_mips.deb stable/main/binary-mips/libwmaker0-dev_0.80.0-4.2_mips.deb stable/main/binary-mips/libwings-dev_0.80.0-4.2_mips.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-m68k/libwraster2_0.80.0-4.2_m68k.deb stable/main/binary-m68k/wmaker_0.80.0-4.2_m68k.deb stable/main/binary-m68k/libwraster2-dev_0.80.0-4.2_m68k.deb stable/main/binary-m68k/libwings-dev_0.80.0-4.2_m68k.deb stable/main/binary-m68k/libwmaker0-dev_0.80.0-4.2_m68k.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-ia64/wmaker_0.80.0-4.2_ia64.deb stable/main/binary-ia64/libwraster2-dev_0.80.0-4.2_ia64.deb stable/main/binary-ia64/libwraster2_0.80.0-4.2_ia64.deb stable/main/binary-ia64/libwings-dev_0.80.0-4.2_ia64.deb stable/main/binary-ia64/libwmaker0-dev_0.80.0-4.2_ia64.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-i386/libwings-dev_0.80.0-4.2_i386.deb stable/main/binary-i386/libwmaker0-dev_0.80.0-4.2_i386.deb stable/main/binary-i386/libwraster2_0.80.0-4.2_i386.deb stable/main/binary-i386/wmaker_0.80.0-4.2_i386.deb stable/main/binary-i386/libwraster2-dev_0.80.0-4.2_i386.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-hppa/libwraster2-dev_0.80.0-4.2_hppa.deb stable/main/binary-hppa/wmaker_0.80.0-4.2_hppa.deb stable/main/binary-hppa/libwraster2_0.80.0-4.2_hppa.deb stable/main/binary-hppa/libwmaker0-dev_0.80.0-4.2_hppa.deb stable/main/binary-hppa/libwings-dev_0.80.0-4.2_hppa.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-arm/libwraster2_0.80.0-4.2_arm.deb stable/main/binary-arm/libwmaker0-dev_0.80.0-4.2_arm.deb stable/main/binary-arm/wmaker_0.80.0-4.2_arm.deb stable/main/binary-arm/libwraster2-dev_0.80.0-4.2_arm.deb stable/main/binary-arm/libwings-dev_0.80.0-4.2_arm.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-alpha/wmaker_0.80.0-4.2_alpha.deb stable/main/binary-alpha/libwraster2_0.80.0-4.2_alpha.deb stable/main/binary-alpha/libwmaker0-dev_0.80.0-4.2_alpha.deb stable/main/binary-alpha/libwraster2-dev_0.80.0-4.2_alpha.deb stable/main/binary-alpha/libwings-dev_0.80.0-4.2_alpha.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/source/wmaker_0.80.0-4.2.dsc stable/main/source/wmaker_0.80.0-4.2.diff.gz stable/main/binary-mipsel/wmaker_0.80.0-4.2_mipsel.deb stable/main/binary-mipsel/libwings-dev_0.80.0-4.2_mipsel.deb stable/main/binary-mipsel/libwraster2-dev_0.80.0-4.2_mipsel.deb stable/main/binary-mipsel/libwmaker0-dev_0.80.0-4.2_mipsel.deb stable/main/binary-mipsel/libwraster2_0.80.0-4.2_mipsel.deb wmaker (0.80.0-4.2) stable-security; urgency=medium * Non-maintainer upload by the Stale Release Manager * Bump the version number so that the security update can make its way into Debian stable. stable/main/binary-all/webmin-samba_0.94-7woody4_all.deb stable/main/binary-all/webmin-postgresql_0.94-7woody4_all.deb stable/main/binary-all/webmin-heartbeat_0.94-7woody4_all.deb stable/main/binary-all/webmin-sshd_0.94-7woody4_all.deb stable/main/binary-all/webmin-software_0.94-7woody4_all.deb stable/main/binary-all/webmin-burner_0.94-7woody4_all.deb stable/main/binary-all/webmin-nis_0.94-7woody4_all.deb stable/main/binary-all/webmin-qmailadmin_0.94-7woody4_all.deb stable/main/binary-all/webmin-xinetd_0.94-7woody4_all.deb stable/main/binary-all/webmin-stunnel_0.94-7woody4_all.deb stable/main/binary-all/webmin-sendmail_0.94-7woody4_all.deb stable/main/binary-all/webmin-raid_0.94-7woody4_all.deb stable/main/source/webmin_0.94-7woody4.dsc stable/main/binary-all/webmin-cluster-useradmin_0.94-7woody4_all.deb stable/main/binary-all/webmin-mysql_0.94-7woody4_all.deb stable/main/binary-all/webmin-fetchmail_0.94-7woody4_all.deb stable/main/binary-all/webmin_0.94-7woody4_all.deb stable/main/binary-all/webmin-status_0.94-7woody4_all.deb stable/main/binary-all/webmin-mon_0.94-7woody4_all.deb stable/main/binary-all/webmin-exports_0.94-7woody4_all.deb stable/main/binary-all/webmin-ppp_0.94-7woody4_all.deb stable/main/binary-all/webmin-apache_0.94-7woody4_all.deb stable/main/binary-all/webmin-dhcpd_0.94-7woody4_all.deb stable/main/binary-all/webmin-cluster-software_0.94-7woody4_all.deb stable/main/binary-all/webmin-squid_0.94-7woody4_all.deb stable/main/binary-all/webmin-postfix_0.94-7woody4_all.deb stable/main/binary-all/webmin-bind8_0.94-7woody4_all.deb stable/main/binary-all/webmin-cpan_0.94-7woody4_all.deb stable/main/binary-all/webmin-inetd_0.94-7woody4_all.deb stable/main/binary-all/webmin-jabber_0.94-7woody4_all.deb stable/main/binary-i386/webmin-grub_0.94-7woody4_i386.deb stable/main/binary-all/webmin-ssl_0.94-7woody4_all.deb stable/main/binary-all/webmin-quota_0.94-7woody4_all.deb stable/main/binary-all/webmin-wuftpd_0.94-7woody4_all.deb stable/main/binary-all/webmin-core_0.94-7woody4_all.deb stable/main/binary-all/webmin-lpadmin_0.94-7woody4_all.deb stable/main/source/webmin_0.94-7woody4.diff.gz webmin (0.94-7woody4) stable; urgency=medium * Non-maintainer upload by Stable Release Manager * Corrected the security update to reuse existing temporary directories (closes: Bug#285762, Bug#289464) stable/main/binary-i386/vdr-kbd_1.0.0-1woody2_i386.deb stable/main/binary-i386/vdr_1.0.0-1woody2_i386.deb stable/main/binary-i386/vdr-lirc_1.0.0-1woody2_i386.deb stable/main/binary-i386/vdr-rcu_1.0.0-1woody2_i386.deb stable/main/source/vdr_1.0.0-1woody2.dsc stable/main/binary-i386/vdr-daemon_1.0.0-1woody2_i386.deb stable/main/source/vdr_1.0.0-1woody2.tar.gz vdr (1.0.0-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed arbitrary file overwrite vulnerability by switching from fopen() to open()+fdreopen() and O_CREAT|O_EXCL [debian/patches/security-z50_CAN-2005-0071_fopen, CAN-2005-0071] stable/non-free/binary-arm/unarj_2.43-3woody1_arm.deb stable/non-free/binary-ia64/unarj_2.43-3woody1_ia64.deb stable/non-free/binary-m68k/unarj_2.43-3woody1_m68k.deb stable/non-free/binary-i386/unarj_2.43-3woody1_i386.deb stable/non-free/binary-powerpc/unarj_2.43-3woody1_powerpc.deb stable/non-free/source/unarj_2.43-3woody1.diff.gz stable/non-free/binary-sparc/unarj_2.43-3woody1_sparc.deb stable/non-free/source/unarj_2.43-3woody1.dsc stable/non-free/binary-s390/unarj_2.43-3woody1_s390.deb stable/non-free/binary-alpha/unarj_2.43-3woody1_alpha.deb stable/non-free/binary-hppa/unarj_2.43-3woody1_hppa.deb unarj (2.43-3woody1) stable-security; urgency=high * Fix buffer overflow problem in filename handling (CAN-2004-0947). Closes: #281922 * Fix unchecked path extraction problem (CAN-2004-1027). stable/main/binary-sparc/typespeed_0.4.1-2.3_sparc.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-s390/typespeed_0.4.1-2.3_s390.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-powerpc/typespeed_0.4.1-2.3_powerpc.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-mips/typespeed_0.4.1-2.3_mips.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-m68k/typespeed_0.4.1-2.3_m68k.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-ia64/typespeed_0.4.1-2.3_ia64.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-i386/typespeed_0.4.1-2.3_i386.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-hppa/typespeed_0.4.1-2.3_hppa.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-arm/typespeed_0.4.1-2.3_arm.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-alpha/typespeed_0.4.1-2.3_alpha.deb typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/binary-mipsel/typespeed_0.4.1-2.3_mipsel.deb stable/main/source/typespeed_0.4.1-2.3.dsc stable/main/source/typespeed_0.4.1-2.3.diff.gz typespeed (0.4.1-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [file.c, CAN-2005-0105] stable/main/source/toolchain-source_3.0.4-1woody1.dsc stable/main/source/toolchain-source_3.0.4-1woody1.tar.gz stable/main/binary-all/toolchain-source_3.0.4-1woody1_all.deb toolchain-source (3.0.4-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved insecure temporary files into a secure temporary directory [bin/tpkg-install-libc, CAN-2005-0159] stable/main/binary-sparc/libtiff-tools_3.5.5-6.woody5_sparc.deb stable/main/binary-sparc/libtiff3g_3.5.5-6.woody5_sparc.deb stable/main/binary-sparc/libtiff3g-dev_3.5.5-6.woody5_sparc.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-s390/libtiff3g_3.5.5-6.woody5_s390.deb stable/main/binary-s390/libtiff3g-dev_3.5.5-6.woody5_s390.deb stable/main/binary-s390/libtiff-tools_3.5.5-6.woody5_s390.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-powerpc/libtiff-tools_3.5.5-6.woody5_powerpc.deb stable/main/binary-powerpc/libtiff3g_3.5.5-6.woody5_powerpc.deb stable/main/binary-powerpc/libtiff3g-dev_3.5.5-6.woody5_powerpc.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-mips/libtiff-tools_3.5.5-6.woody5_mips.deb stable/main/binary-mips/libtiff3g-dev_3.5.5-6.woody5_mips.deb stable/main/binary-mips/libtiff3g_3.5.5-6.woody5_mips.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-m68k/libtiff3g_3.5.5-6.woody5_m68k.deb stable/main/binary-m68k/libtiff3g-dev_3.5.5-6.woody5_m68k.deb stable/main/binary-m68k/libtiff-tools_3.5.5-6.woody5_m68k.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-ia64/libtiff3g-dev_3.5.5-6.woody5_ia64.deb stable/main/binary-ia64/libtiff3g_3.5.5-6.woody5_ia64.deb stable/main/binary-ia64/libtiff-tools_3.5.5-6.woody5_ia64.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-i386/libtiff3g-dev_3.5.5-6.woody5_i386.deb stable/main/binary-i386/libtiff-tools_3.5.5-6.woody5_i386.deb stable/main/binary-i386/libtiff3g_3.5.5-6.woody5_i386.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-hppa/libtiff3g_3.5.5-6.woody5_hppa.deb stable/main/binary-hppa/libtiff3g-dev_3.5.5-6.woody5_hppa.deb stable/main/binary-hppa/libtiff-tools_3.5.5-6.woody5_hppa.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-arm/libtiff3g_3.5.5-6.woody5_arm.deb stable/main/binary-arm/libtiff3g-dev_3.5.5-6.woody5_arm.deb stable/main/binary-arm/libtiff-tools_3.5.5-6.woody5_arm.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-alpha/libtiff3g-dev_3.5.5-6.woody5_alpha.deb stable/main/binary-alpha/libtiff3g_3.5.5-6.woody5_alpha.deb stable/main/binary-alpha/libtiff-tools_3.5.5-6.woody5_alpha.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-mipsel/libtiff3g-dev_3.5.5-6.woody5_mipsel.deb stable/main/source/tiff_3.5.5-6.woody5.diff.gz stable/main/source/tiff_3.5.5-6.woody5.dsc stable/main/binary-mipsel/libtiff-tools_3.5.5-6.woody5_mipsel.deb stable/main/binary-mipsel/libtiff3g_3.5.5-6.woody5_mipsel.deb tiff (3.5.5-6.woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dmitry V. Levin to fix a segmentation fault [tools/tiffdump.c, CAN-2004-1183] * Removed spurious .orig file from the last version. stable/main/binary-sparc/synaesthesia_2.1-2.1woody3_sparc.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-s390/synaesthesia_2.1-2.1woody3_s390.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-powerpc/synaesthesia_2.1-2.1woody3_powerpc.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-mips/synaesthesia_2.1-2.1woody3_mips.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-m68k/synaesthesia_2.1-2.1woody3_m68k.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-ia64/synaesthesia_2.1-2.1woody3_ia64.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-i386/synaesthesia_2.1-2.1woody3_i386.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-hppa/synaesthesia_2.1-2.1woody3_hppa.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-arm/synaesthesia_2.1-2.1woody3_arm.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-alpha/synaesthesia_2.1-2.1woody3_alpha.deb synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-mipsel/synaesthesia_2.1-2.1woody3_mipsel.deb stable/main/source/synaesthesia_2.1-2.1woody3.dsc stable/main/source/synaesthesia_2.1-2.1woody3.diff.gz synaesthesia (2.1-2.1woody3) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070] stable/main/binary-sparc/sympa_3.3.3-3woody2_sparc.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-s390/sympa_3.3.3-3woody2_s390.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-powerpc/sympa_3.3.3-3woody2_powerpc.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-mips/sympa_3.3.3-3woody2_mips.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-m68k/sympa_3.3.3-3woody2_m68k.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-ia64/sympa_3.3.3-3woody2_ia64.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-i386/sympa_3.3.3-3woody2_i386.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-hppa/sympa_3.3.3-3woody2_hppa.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-arm/sympa_3.3.3-3woody2_arm.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-alpha/sympa_3.3.3-3woody2_alpha.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/source/sympa_3.3.3-3woody2.diff.gz stable/main/binary-all/wwsympa_3.3.3-3woody2_all.deb stable/main/source/sympa_3.3.3-3woody2.dsc stable/main/binary-mipsel/sympa_3.3.3-3woody2_mipsel.deb sympa (3.3.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow [src/queue.c, CAN-2005-0073] stable/main/binary-sparc/libsword-dev_1.5.3-3woody2_sparc.deb stable/main/binary-sparc/libsword-runtime_1.5.3-3woody2_sparc.deb stable/main/binary-sparc/diatheke_1.5.3-3woody2_sparc.deb stable/main/binary-sparc/libsword1_1.5.3-3woody2_sparc.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/diatheke_1.5.3-3woody2_s390.deb stable/main/binary-s390/libsword1_1.5.3-3woody2_s390.deb stable/main/binary-s390/libsword-runtime_1.5.3-3woody2_s390.deb stable/main/binary-s390/libsword-dev_1.5.3-3woody2_s390.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/libsword-runtime_1.5.3-3woody2_powerpc.deb stable/main/binary-powerpc/libsword-dev_1.5.3-3woody2_powerpc.deb stable/main/binary-powerpc/diatheke_1.5.3-3woody2_powerpc.deb stable/main/binary-powerpc/libsword1_1.5.3-3woody2_powerpc.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/libsword-runtime_1.5.3-3woody2_mips.deb stable/main/binary-mips/libsword1_1.5.3-3woody2_mips.deb stable/main/binary-mips/diatheke_1.5.3-3woody2_mips.deb stable/main/binary-mips/libsword-dev_1.5.3-3woody2_mips.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/libsword1_1.5.3-3woody2_m68k.deb stable/main/binary-m68k/libsword-runtime_1.5.3-3woody2_m68k.deb stable/main/binary-m68k/libsword-dev_1.5.3-3woody2_m68k.deb stable/main/binary-m68k/diatheke_1.5.3-3woody2_m68k.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/libsword1_1.5.3-3woody2_ia64.deb stable/main/binary-ia64/libsword-runtime_1.5.3-3woody2_ia64.deb stable/main/binary-ia64/libsword-dev_1.5.3-3woody2_ia64.deb stable/main/binary-ia64/diatheke_1.5.3-3woody2_ia64.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/libsword-dev_1.5.3-3woody2_i386.deb stable/main/binary-i386/diatheke_1.5.3-3woody2_i386.deb stable/main/binary-i386/libsword1_1.5.3-3woody2_i386.deb stable/main/binary-i386/libsword-runtime_1.5.3-3woody2_i386.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/libsword-runtime_1.5.3-3woody2_hppa.deb stable/main/binary-hppa/diatheke_1.5.3-3woody2_hppa.deb stable/main/binary-hppa/libsword1_1.5.3-3woody2_hppa.deb stable/main/binary-hppa/libsword-dev_1.5.3-3woody2_hppa.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/libsword1_1.5.3-3woody2_arm.deb stable/main/binary-arm/diatheke_1.5.3-3woody2_arm.deb stable/main/binary-arm/libsword-runtime_1.5.3-3woody2_arm.deb stable/main/binary-arm/libsword-dev_1.5.3-3woody2_arm.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/libsword1_1.5.3-3woody2_alpha.deb stable/main/binary-alpha/diatheke_1.5.3-3woody2_alpha.deb stable/main/binary-alpha/libsword-dev_1.5.3-3woody2_alpha.deb stable/main/binary-alpha/libsword-runtime_1.5.3-3woody2_alpha.deb sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/libsword1_1.5.3-3woody2_mipsel.deb stable/main/binary-mipsel/libsword-runtime_1.5.3-3woody2_mipsel.deb stable/main/source/sword_1.5.3-3woody2.dsc stable/main/binary-mipsel/diatheke_1.5.3-3woody2_mipsel.deb stable/main/binary-mipsel/libsword-dev_1.5.3-3woody2_mipsel.deb stable/main/source/sword_1.5.3-3woody2.diff.gz sword (1.5.3-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added shell_escape() function to fix arbitrary command execution [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015] * Improvements by Ulf Härnhammar * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/ssed_3.57a-2woody1_sparc.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/ssed_3.57a-2woody1_s390.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/ssed_3.57a-2woody1_powerpc.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/ssed_3.57a-2woody1_mipsel.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/ssed_3.57a-2woody1_mips.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/ssed_3.57a-2woody1_m68k.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/ssed_3.57a-2woody1_ia64.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/ssed_3.57a-2woody1_i386.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/ssed_3.57a-2woody1_arm.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/ssed_3.57a-2woody1_alpha.deb ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/source/ssed_3.57a-2woody1.diff.gz stable/main/binary-hppa/ssed_3.57a-2woody1_hppa.deb stable/main/source/ssed_3.57a-2woody1.dsc ssed (3.57a-2woody1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-all/squirrelmail_1.2.6-3_all.deb stable/main/source/squirrelmail_1.2.6-3.dsc stable/main/source/squirrelmail_1.2.6-3.diff.gz squirrelmail (1:1.2.6-3) stable-security; urgency=low * Correct bug in previous security fix which broke logout_error(): timed out users did not get a friendly message anymore but a bunch of failed-to-include-errors. (Closes: #295836) stable/main/binary-sparc/squidclient_2.4.6-2woody7_sparc.deb stable/main/binary-sparc/squid-cgi_2.4.6-2woody7_sparc.deb stable/main/binary-sparc/squid_2.4.6-2woody7_sparc.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-s390/squidclient_2.4.6-2woody7_s390.deb stable/main/binary-s390/squid_2.4.6-2woody7_s390.deb stable/main/binary-s390/squid-cgi_2.4.6-2woody7_s390.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-powerpc/squid-cgi_2.4.6-2woody7_powerpc.deb stable/main/binary-powerpc/squidclient_2.4.6-2woody7_powerpc.deb stable/main/binary-powerpc/squid_2.4.6-2woody7_powerpc.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-mips/squid_2.4.6-2woody7_mips.deb stable/main/binary-mips/squidclient_2.4.6-2woody7_mips.deb stable/main/binary-mips/squid-cgi_2.4.6-2woody7_mips.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-m68k/squid_2.4.6-2woody7_m68k.deb stable/main/binary-m68k/squid-cgi_2.4.6-2woody7_m68k.deb stable/main/binary-m68k/squidclient_2.4.6-2woody7_m68k.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-ia64/squid_2.4.6-2woody7_ia64.deb stable/main/binary-ia64/squidclient_2.4.6-2woody7_ia64.deb stable/main/binary-ia64/squid-cgi_2.4.6-2woody7_ia64.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-i386/squid-cgi_2.4.6-2woody7_i386.deb stable/main/binary-i386/squidclient_2.4.6-2woody7_i386.deb stable/main/binary-i386/squid_2.4.6-2woody7_i386.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-hppa/squidclient_2.4.6-2woody7_hppa.deb stable/main/binary-hppa/squid-cgi_2.4.6-2woody7_hppa.deb stable/main/binary-hppa/squid_2.4.6-2woody7_hppa.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-arm/squid_2.4.6-2woody7_arm.deb stable/main/binary-arm/squidclient_2.4.6-2woody7_arm.deb stable/main/binary-arm/squid-cgi_2.4.6-2woody7_arm.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-alpha/squid_2.4.6-2woody7_alpha.deb stable/main/binary-alpha/squidclient_2.4.6-2woody7_alpha.deb stable/main/binary-alpha/squid-cgi_2.4.6-2woody7_alpha.deb squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-mipsel/squid_2.4.6-2woody7_mipsel.deb stable/main/source/squid_2.4.6-2woody7.diff.gz stable/main/binary-mipsel/squidclient_2.4.6-2woody7_mipsel.deb stable/main/binary-mipsel/squid-cgi_2.4.6-2woody7_mipsel.deb stable/main/source/squid_2.4.6-2woody7.dsc squid (2.4.6-2woody7) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for DoS in DNS reply parsing o squid-2.5.STABLE8-dns_assert.patch o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446 stable/main/binary-sparc/slocate_2.6-1.3.3_sparc.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-s390/slocate_2.6-1.3.3_s390.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-powerpc/slocate_2.6-1.3.3_powerpc.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-mips/slocate_2.6-1.3.3_mips.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-m68k/slocate_2.6-1.3.3_m68k.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-ia64/slocate_2.6-1.3.3_ia64.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-i386/slocate_2.6-1.3.3_i386.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-hppa/slocate_2.6-1.3.3_hppa.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-arm/slocate_2.6-1.3.3_arm.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-alpha/slocate_2.6-1.3.3_alpha.deb slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/source/slocate_2.6-1.3.3.dsc stable/main/binary-mipsel/slocate_2.6-1.3.3_mipsel.deb stable/main/source/slocate_2.6-1.3.3.diff.gz slocate (2.6-1.3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103) stable/main/binary-sparc/remstats-bintools_1.00a4-8woody1_sparc.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-s390/remstats-bintools_1.00a4-8woody1_s390.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-powerpc/remstats-bintools_1.00a4-8woody1_powerpc.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-mipsel/remstats-bintools_1.00a4-8woody1_mipsel.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-mips/remstats-bintools_1.00a4-8woody1_mips.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-m68k/remstats-bintools_1.00a4-8woody1_m68k.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-ia64/remstats-bintools_1.00a4-8woody1_ia64.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-i386/remstats-bintools_1.00a4-8woody1_i386.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-hppa/remstats-bintools_1.00a4-8woody1_hppa.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-alpha/remstats-bintools_1.00a4-8woody1_alpha.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-all/remstats-doc_1.00a4-8woody1_all.deb stable/main/binary-all/remstats-servers_1.00a4-8woody1_all.deb stable/main/source/remstats_1.00a4-8woody1.diff.gz stable/main/source/remstats_1.00a4-8woody1.dsc stable/main/binary-arm/remstats-bintools_1.00a4-8woody1_arm.deb stable/main/binary-all/remstats_1.00a4-8woody1_all.deb remstats (1.00a4-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled debug file /tmp/uptimes in order to prevent a symlink attack against the server [unix-status-server.pl, CAN-2005-0387] * Added test for invalid IP numbers to fix arbitrary command execution [remoteping-server.pl, CAN-2005-0388] stable/main/binary-sparc/queue_1.30.1-4woody2_sparc.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/queue_1.30.1-4woody2_s390.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/queue_1.30.1-4woody2_powerpc.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/queue_1.30.1-4woody2_mips.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/queue_1.30.1-4woody2_m68k.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/queue_1.30.1-4woody2_ia64.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/queue_1.30.1-4woody2_i386.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/queue_1.30.1-4woody2_hppa.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/queue_1.30.1-4woody2_arm.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/queue_1.30.1-4woody2_alpha.deb queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/queue_1.30.1-4woody2_mipsel.deb stable/main/source/queue_1.30.1-4woody2.dsc stable/main/source/queue_1.30.1-4woody2.diff.gz queue (1.30.1-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by "jaguar" to fix several buffer overflows [queue.c, queued.c, CAN-2004-0555] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/qpopper_4.0.4-2.woody.4_sparc.deb stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.4_sparc.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.4_s390.deb stable/main/binary-s390/qpopper_4.0.4-2.woody.4_s390.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-powerpc/qpopper_4.0.4-2.woody.4_powerpc.deb stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.4_powerpc.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.4_mips.deb stable/main/binary-mips/qpopper_4.0.4-2.woody.4_mips.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-m68k/qpopper_4.0.4-2.woody.4_m68k.deb stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.4_m68k.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.4_ia64.deb stable/main/binary-ia64/qpopper_4.0.4-2.woody.4_ia64.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-i386/qpopper_4.0.4-2.woody.4_i386.deb stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.4_i386.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.4_hppa.deb stable/main/binary-hppa/qpopper_4.0.4-2.woody.4_hppa.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.4_arm.deb stable/main/binary-arm/qpopper_4.0.4-2.woody.4_arm.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.4_alpha.deb stable/main/binary-alpha/qpopper_4.0.4-2.woody.4_alpha.deb qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-mipsel/qpopper_4.0.4-2.woody.4_mipsel.deb stable/main/source/qpopper_4.0.4-2.woody.4.dsc stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.4_mipsel.deb stable/main/source/qpopper_4.0.4-2.woody.4.diff.gz qpopper (4.0.4-2.woody.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * No-changes rebuilt so that the package can migrate into proposed updates, since binary files from the former upload got lost on ftpmaster * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143) stable/main/binary-sparc/python2.2_2.2.1-4.7_sparc.deb stable/main/binary-sparc/python2.2-dev_2.2.1-4.7_sparc.deb stable/main/binary-sparc/python2.2-gdbm_2.2.1-4.7_sparc.deb stable/main/binary-sparc/python2.2-mpz_2.2.1-4.7_sparc.deb stable/main/binary-sparc/python2.2-xmlbase_2.2.1-4.7_sparc.deb stable/main/binary-sparc/python2.2-tk_2.2.1-4.7_sparc.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-s390/python2.2-tk_2.2.1-4.7_s390.deb stable/main/binary-s390/python2.2-mpz_2.2.1-4.7_s390.deb stable/main/binary-s390/python2.2_2.2.1-4.7_s390.deb stable/main/binary-s390/python2.2-gdbm_2.2.1-4.7_s390.deb stable/main/binary-s390/python2.2-xmlbase_2.2.1-4.7_s390.deb stable/main/binary-s390/python2.2-dev_2.2.1-4.7_s390.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-powerpc/python2.2_2.2.1-4.7_powerpc.deb stable/main/binary-powerpc/python2.2-xmlbase_2.2.1-4.7_powerpc.deb stable/main/binary-powerpc/python2.2-gdbm_2.2.1-4.7_powerpc.deb stable/main/binary-powerpc/python2.2-mpz_2.2.1-4.7_powerpc.deb stable/main/binary-powerpc/python2.2-dev_2.2.1-4.7_powerpc.deb stable/main/binary-powerpc/python2.2-tk_2.2.1-4.7_powerpc.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-mips/python2.2-dev_2.2.1-4.7_mips.deb stable/main/binary-mips/python2.2-mpz_2.2.1-4.7_mips.deb stable/main/binary-mips/python2.2-gdbm_2.2.1-4.7_mips.deb stable/main/binary-mips/python2.2_2.2.1-4.7_mips.deb stable/main/binary-mips/python2.2-xmlbase_2.2.1-4.7_mips.deb stable/main/binary-mips/python2.2-tk_2.2.1-4.7_mips.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-m68k/python2.2-gdbm_2.2.1-4.7_m68k.deb stable/main/binary-m68k/python2.2-tk_2.2.1-4.7_m68k.deb stable/main/binary-m68k/python2.2_2.2.1-4.7_m68k.deb stable/main/binary-m68k/python2.2-dev_2.2.1-4.7_m68k.deb stable/main/binary-m68k/python2.2-xmlbase_2.2.1-4.7_m68k.deb stable/main/binary-m68k/python2.2-mpz_2.2.1-4.7_m68k.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-ia64/python2.2-tk_2.2.1-4.7_ia64.deb stable/main/binary-ia64/python2.2-mpz_2.2.1-4.7_ia64.deb stable/main/binary-ia64/python2.2-gdbm_2.2.1-4.7_ia64.deb stable/main/binary-ia64/python2.2-xmlbase_2.2.1-4.7_ia64.deb stable/main/binary-ia64/python2.2_2.2.1-4.7_ia64.deb stable/main/binary-ia64/python2.2-dev_2.2.1-4.7_ia64.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-i386/python2.2-mpz_2.2.1-4.7_i386.deb stable/main/binary-i386/python2.2-dev_2.2.1-4.7_i386.deb stable/main/binary-i386/python2.2-gdbm_2.2.1-4.7_i386.deb stable/main/binary-i386/python2.2-tk_2.2.1-4.7_i386.deb stable/main/binary-i386/python2.2-xmlbase_2.2.1-4.7_i386.deb stable/main/binary-i386/python2.2_2.2.1-4.7_i386.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-hppa/python2.2_2.2.1-4.7_hppa.deb stable/main/binary-hppa/python2.2-tk_2.2.1-4.7_hppa.deb stable/main/binary-hppa/python2.2-mpz_2.2.1-4.7_hppa.deb stable/main/binary-hppa/python2.2-gdbm_2.2.1-4.7_hppa.deb stable/main/binary-hppa/python2.2-xmlbase_2.2.1-4.7_hppa.deb stable/main/binary-hppa/python2.2-dev_2.2.1-4.7_hppa.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-arm/python2.2-xmlbase_2.2.1-4.7_arm.deb stable/main/binary-arm/python2.2-mpz_2.2.1-4.7_arm.deb stable/main/binary-arm/python2.2-gdbm_2.2.1-4.7_arm.deb stable/main/binary-arm/python2.2-dev_2.2.1-4.7_arm.deb stable/main/binary-arm/python2.2-tk_2.2.1-4.7_arm.deb stable/main/binary-arm/python2.2_2.2.1-4.7_arm.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-alpha/python2.2-xmlbase_2.2.1-4.7_alpha.deb stable/main/binary-alpha/python2.2-dev_2.2.1-4.7_alpha.deb stable/main/binary-alpha/python2.2-tk_2.2.1-4.7_alpha.deb stable/main/binary-alpha/python2.2-mpz_2.2.1-4.7_alpha.deb stable/main/binary-alpha/python2.2-gdbm_2.2.1-4.7_alpha.deb stable/main/binary-alpha/python2.2_2.2.1-4.7_alpha.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-mipsel/python2.2-tk_2.2.1-4.7_mipsel.deb stable/main/binary-all/python2.2-examples_2.2.1-4.7_all.deb stable/main/binary-mipsel/python2.2-dev_2.2.1-4.7_mipsel.deb stable/main/binary-mipsel/python2.2-xmlbase_2.2.1-4.7_mipsel.deb stable/main/binary-mipsel/python2.2-gdbm_2.2.1-4.7_mipsel.deb stable/main/binary-all/idle-python2.2_2.2.1-4.7_all.deb stable/main/binary-mipsel/python2.2-mpz_2.2.1-4.7_mipsel.deb stable/main/source/python2.2_2.2.1-4.7.diff.gz stable/main/binary-all/python2.2-elisp_2.2.1-4.7_all.deb stable/main/source/python2.2_2.2.1-4.7.dsc stable/main/binary-all/python2.2-doc_2.2.1-4.7_all.deb stable/main/binary-mipsel/python2.2_2.2.1-4.7_mipsel.deb python2.2 (2.2.1-4.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a design flaw in the XML/RPC Server implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089, security_CAN-2005-0089_xml.dpatch] stable/main/binary-sparc/prozilla_1.3.6-3woody1_sparc.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-s390/prozilla_1.3.6-3woody1_s390.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-powerpc/prozilla_1.3.6-3woody1_powerpc.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-mips/prozilla_1.3.6-3woody1_mips.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-m68k/prozilla_1.3.6-3woody1_m68k.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-ia64/prozilla_1.3.6-3woody1_ia64.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-i386/prozilla_1.3.6-3woody1_i386.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-hppa/prozilla_1.3.6-3woody1_hppa.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-arm/prozilla_1.3.6-3woody1_arm.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-alpha/prozilla_1.3.6-3woody1_alpha.deb prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-mipsel/prozilla_1.3.6-3woody1_mipsel.deb stable/main/source/prozilla_1.3.6-3woody1.dsc stable/main/source/prozilla_1.3.6-3woody1.diff.gz prozilla (1:1.3.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows [src/curses.c, src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c, src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120] stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/postgresql-dev_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/libpgsql2_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/pgaccess_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/postgresql-client_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/python-pygresql_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/libpgperl_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/libpgtcl_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/postgresql_7.2.1-2woody8_sparc.deb stable/main/binary-sparc/libecpg3_7.2.1-2woody8_sparc.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-s390/postgresql-client_7.2.1-2woody8_s390.deb stable/main/binary-s390/pgaccess_7.2.1-2woody8_s390.deb stable/main/binary-s390/libpgperl_7.2.1-2woody8_s390.deb stable/main/binary-s390/python-pygresql_7.2.1-2woody8_s390.deb stable/main/binary-s390/postgresql-contrib_7.2.1-2woody8_s390.deb stable/main/binary-s390/postgresql-dev_7.2.1-2woody8_s390.deb stable/main/binary-s390/libpgtcl_7.2.1-2woody8_s390.deb stable/main/binary-s390/odbc-postgresql_7.2.1-2woody8_s390.deb stable/main/binary-s390/postgresql_7.2.1-2woody8_s390.deb stable/main/binary-s390/libpgsql2_7.2.1-2woody8_s390.deb stable/main/binary-s390/libecpg3_7.2.1-2woody8_s390.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-powerpc/libpgperl_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/libpgsql2_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/pgaccess_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/python-pygresql_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/libecpg3_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody8_powerpc.deb stable/main/binary-powerpc/postgresql_7.2.1-2woody8_powerpc.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-mipsel/python-pygresql_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/libpgsql2_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/libecpg3_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/postgresql_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/pgaccess_7.2.1-2woody8_mipsel.deb stable/main/binary-mipsel/libpgperl_7.2.1-2woody8_mipsel.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-mips/postgresql-dev_7.2.1-2woody8_mips.deb stable/main/binary-mips/libpgtcl_7.2.1-2woody8_mips.deb stable/main/binary-mips/postgresql_7.2.1-2woody8_mips.deb stable/main/binary-mips/pgaccess_7.2.1-2woody8_mips.deb stable/main/binary-mips/libpgperl_7.2.1-2woody8_mips.deb stable/main/binary-mips/libecpg3_7.2.1-2woody8_mips.deb stable/main/binary-mips/python-pygresql_7.2.1-2woody8_mips.deb stable/main/binary-mips/odbc-postgresql_7.2.1-2woody8_mips.deb stable/main/binary-mips/postgresql-client_7.2.1-2woody8_mips.deb stable/main/binary-mips/libpgsql2_7.2.1-2woody8_mips.deb stable/main/binary-mips/postgresql-contrib_7.2.1-2woody8_mips.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-m68k/postgresql-dev_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/libecpg3_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/libpgtcl_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/python-pygresql_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/libpgperl_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/libpgsql2_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/pgaccess_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/postgresql-client_7.2.1-2woody8_m68k.deb stable/main/binary-m68k/postgresql_7.2.1-2woody8_m68k.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-ia64/postgresql_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/pgaccess_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/libpgperl_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/postgresql-dev_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/libecpg3_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/libpgtcl_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/libpgsql2_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/postgresql-client_7.2.1-2woody8_ia64.deb stable/main/binary-ia64/python-pygresql_7.2.1-2woody8_ia64.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/libpgperl_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/libecpg3_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/libpgtcl_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/python-pygresql_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/libpgsql2_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/postgresql-client_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/postgresql_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/pgaccess_7.2.1-2woody8_hppa.deb stable/main/binary-hppa/postgresql-dev_7.2.1-2woody8_hppa.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-arm/libpgsql2_7.2.1-2woody8_arm.deb stable/main/binary-arm/postgresql-contrib_7.2.1-2woody8_arm.deb stable/main/binary-arm/postgresql-dev_7.2.1-2woody8_arm.deb stable/main/binary-arm/odbc-postgresql_7.2.1-2woody8_arm.deb stable/main/binary-arm/libpgtcl_7.2.1-2woody8_arm.deb stable/main/binary-arm/pgaccess_7.2.1-2woody8_arm.deb stable/main/binary-arm/postgresql-client_7.2.1-2woody8_arm.deb stable/main/binary-arm/postgresql_7.2.1-2woody8_arm.deb stable/main/binary-arm/libecpg3_7.2.1-2woody8_arm.deb stable/main/binary-arm/python-pygresql_7.2.1-2woody8_arm.deb stable/main/binary-arm/libpgperl_7.2.1-2woody8_arm.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-alpha/libecpg3_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/postgresql-client_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/libpgperl_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/postgresql-dev_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/python-pygresql_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/libpgtcl_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/postgresql_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/libpgsql2_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/pgaccess_7.2.1-2woody8_alpha.deb stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody8_alpha.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/source/postgresql_7.2.1-2woody8.dsc stable/main/binary-i386/postgresql_7.2.1-2woody8_i386.deb stable/main/binary-all/postgresql-doc_7.2.1-2woody8_all.deb stable/main/binary-i386/odbc-postgresql_7.2.1-2woody8_i386.deb stable/main/binary-i386/libpgtcl_7.2.1-2woody8_i386.deb stable/main/binary-i386/libpgsql2_7.2.1-2woody8_i386.deb stable/main/source/postgresql_7.2.1-2woody8.diff.gz stable/main/binary-i386/libecpg3_7.2.1-2woody8_i386.deb stable/main/binary-i386/postgresql-client_7.2.1-2woody8_i386.deb stable/main/binary-i386/postgresql-contrib_7.2.1-2woody8_i386.deb stable/main/binary-i386/python-pygresql_7.2.1-2woody8_i386.deb stable/main/binary-i386/libpgperl_7.2.1-2woody8_i386.deb stable/main/binary-i386/postgresql-dev_7.2.1-2woody8_i386.deb stable/main/binary-i386/pgaccess_7.2.1-2woody8_i386.deb postgresql (7.2.1-2woody8) stable-security; urgency=low * Maintainer security upload to fix various vulnerabilities. * src/pl/plpgsql/src/gram.y: - Check various array boundaries to prevent buffer overflows. - References: CAN-2005-0245 CAN-2005-0247 * Notes: - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not apply. - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246 does not apply. * Added CAN number to previous changelog. stable/main/binary-sparc/playmidi_2.4-4woody1_sparc.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-s390/playmidi_2.4-4woody1_s390.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-powerpc/playmidi_2.4-4woody1_powerpc.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-mipsel/playmidi_2.4-4woody1_mipsel.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-mips/playmidi_2.4-4woody1_mips.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-m68k/playmidi_2.4-4woody1_m68k.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-ia64/playmidi_2.4-4woody1_ia64.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-hppa/playmidi_2.4-4woody1_hppa.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-arm/playmidi_2.4-4woody1_arm.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-alpha/playmidi_2.4-4woody1_alpha.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/source/playmidi_2.4-4woody1.diff.gz stable/main/source/playmidi_2.4-4woody1.dsc stable/main/binary-i386/playmidi_2.4-4woody1_i386.deb playmidi (2.4-4woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow in command line handling. [playmidi.c, CAN-2005-0020] stable/main/binary-sparc/libperl-dev_5.6.1-8.9_sparc.deb stable/main/binary-sparc/libperl5.6_5.6.1-8.9_sparc.deb stable/main/binary-sparc/perl_5.6.1-8.9_sparc.deb stable/main/binary-sparc/perl-suid_5.6.1-8.9_sparc.deb stable/main/binary-sparc/perl-debug_5.6.1-8.9_sparc.deb stable/main/binary-sparc/perl-base_5.6.1-8.9_sparc.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-s390/libperl-dev_5.6.1-8.9_s390.deb stable/main/binary-s390/perl-base_5.6.1-8.9_s390.deb stable/main/binary-s390/perl-suid_5.6.1-8.9_s390.deb stable/main/binary-s390/perl-debug_5.6.1-8.9_s390.deb stable/main/binary-s390/perl_5.6.1-8.9_s390.deb stable/main/binary-s390/libperl5.6_5.6.1-8.9_s390.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-powerpc/libperl5.6_5.6.1-8.9_powerpc.deb stable/main/binary-powerpc/perl_5.6.1-8.9_powerpc.deb stable/main/binary-powerpc/perl-base_5.6.1-8.9_powerpc.deb stable/main/binary-powerpc/perl-suid_5.6.1-8.9_powerpc.deb stable/main/binary-powerpc/perl-debug_5.6.1-8.9_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.6.1-8.9_powerpc.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-mipsel/libperl5.6_5.6.1-8.9_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.6.1-8.9_mipsel.deb stable/main/binary-mipsel/perl-suid_5.6.1-8.9_mipsel.deb stable/main/binary-mipsel/perl-debug_5.6.1-8.9_mipsel.deb stable/main/binary-mipsel/perl-base_5.6.1-8.9_mipsel.deb stable/main/binary-mipsel/perl_5.6.1-8.9_mipsel.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-mips/perl_5.6.1-8.9_mips.deb stable/main/binary-mips/libperl5.6_5.6.1-8.9_mips.deb stable/main/binary-mips/libperl-dev_5.6.1-8.9_mips.deb stable/main/binary-mips/perl-suid_5.6.1-8.9_mips.deb stable/main/binary-mips/perl-debug_5.6.1-8.9_mips.deb stable/main/binary-mips/perl-base_5.6.1-8.9_mips.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-m68k/libperl5.6_5.6.1-8.9_m68k.deb stable/main/binary-m68k/perl_5.6.1-8.9_m68k.deb stable/main/binary-m68k/libperl-dev_5.6.1-8.9_m68k.deb stable/main/binary-m68k/perl-base_5.6.1-8.9_m68k.deb stable/main/binary-m68k/perl-debug_5.6.1-8.9_m68k.deb stable/main/binary-m68k/perl-suid_5.6.1-8.9_m68k.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-ia64/perl-debug_5.6.1-8.9_ia64.deb stable/main/binary-ia64/libperl-dev_5.6.1-8.9_ia64.deb stable/main/binary-ia64/perl-base_5.6.1-8.9_ia64.deb stable/main/binary-ia64/perl-suid_5.6.1-8.9_ia64.deb stable/main/binary-ia64/perl_5.6.1-8.9_ia64.deb stable/main/binary-ia64/libperl5.6_5.6.1-8.9_ia64.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-hppa/perl-debug_5.6.1-8.9_hppa.deb stable/main/binary-hppa/perl-base_5.6.1-8.9_hppa.deb stable/main/binary-hppa/perl-suid_5.6.1-8.9_hppa.deb stable/main/binary-hppa/perl_5.6.1-8.9_hppa.deb stable/main/binary-hppa/libperl-dev_5.6.1-8.9_hppa.deb stable/main/binary-hppa/libperl5.6_5.6.1-8.9_hppa.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/source/perl_5.6.1-8.9.diff.gz stable/main/binary-all/libcgi-fast-perl_5.6.1-8.9_all.deb stable/main/source/perl_5.6.1-8.9.dsc stable/main/binary-all/perl-modules_5.6.1-8.9_all.deb stable/main/binary-i386/libperl-dev_5.6.1-8.9_i386.deb stable/main/binary-i386/perl-suid_5.6.1-8.9_i386.deb stable/main/binary-all/perl-doc_5.6.1-8.9_all.deb stable/main/binary-i386/perl-base_5.6.1-8.9_i386.deb stable/main/binary-i386/libperl5.6_5.6.1-8.9_i386.deb stable/main/binary-i386/perl_5.6.1-8.9_i386.deb stable/main/binary-i386/perl-debug_5.6.1-8.9_i386.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-arm/perl-suid_5.6.1-8.9_arm.deb stable/main/binary-arm/perl-debug_5.6.1-8.9_arm.deb stable/main/binary-arm/libperl5.6_5.6.1-8.9_arm.deb stable/main/binary-arm/perl-base_5.6.1-8.9_arm.deb stable/main/binary-arm/libperl-dev_5.6.1-8.9_arm.deb stable/main/binary-arm/perl_5.6.1-8.9_arm.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-alpha/perl-suid_5.6.1-8.9_alpha.deb stable/main/binary-alpha/perl-debug_5.6.1-8.9_alpha.deb stable/main/binary-alpha/libperl5.6_5.6.1-8.9_alpha.deb stable/main/binary-alpha/perl_5.6.1-8.9_alpha.deb stable/main/binary-alpha/perl-base_5.6.1-8.9_alpha.deb stable/main/binary-alpha/libperl-dev_5.6.1-8.9_alpha.deb perl (5.6.1-8.9) stable-security; urgency=high * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race condition which allows an attacker with write permission on directories in the tree being removed to make files setuid or to remove arbitrary files (closes: #286905, #286922). Supersedes the previous patch for CAN-2004-0452. stable/main/binary-sparc/pcal_4.7-8woody1_sparc.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-s390/pcal_4.7-8woody1_s390.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-powerpc/pcal_4.7-8woody1_powerpc.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-mipsel/pcal_4.7-8woody1_mipsel.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-mips/pcal_4.7-8woody1_mips.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-m68k/pcal_4.7-8woody1_m68k.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-ia64/pcal_4.7-8woody1_ia64.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-hppa/pcal_4.7-8woody1_hppa.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-arm/pcal_4.7-8woody1_arm.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-alpha/pcal_4.7-8woody1_alpha.deb pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/source/pcal_4.7-8woody1.dsc stable/main/binary-i386/pcal_4.7-8woody1_i386.deb stable/main/source/pcal_4.7-8woody1.diff.gz pcal (4.7-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix locally exploitable overflow in calandar file handling. [pcalutil.c, readfile.c, CAN-2004-1289] stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody4_sparc.deb stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody4_sparc.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody4_s390.deb stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody4_s390.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody4_powerpc.deb stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody4_powerpc.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody4_mips.deb stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody4_mips.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody4_m68k.deb stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody4_m68k.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody4_ia64.deb stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody4_ia64.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody4_i386.deb stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody4_i386.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody4_hppa.deb stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody4_hppa.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody4_arm.deb stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody4_arm.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody4_alpha.deb stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody4_alpha.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody4.diff.gz stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody4_mipsel.deb stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody4.dsc stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody4_mipsel.deb netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-sparc/telnet_0.17-18woody3_sparc.deb stable/main/binary-sparc/telnetd_0.17-18woody3_sparc.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-s390/telnet_0.17-18woody3_s390.deb stable/main/binary-s390/telnetd_0.17-18woody3_s390.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-powerpc/telnetd_0.17-18woody3_powerpc.deb stable/main/binary-powerpc/telnet_0.17-18woody3_powerpc.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-mips/telnet_0.17-18woody3_mips.deb stable/main/binary-mips/telnetd_0.17-18woody3_mips.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-m68k/telnetd_0.17-18woody3_m68k.deb stable/main/binary-m68k/telnet_0.17-18woody3_m68k.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-ia64/telnet_0.17-18woody3_ia64.deb stable/main/binary-ia64/telnetd_0.17-18woody3_ia64.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-i386/telnetd_0.17-18woody3_i386.deb stable/main/binary-i386/telnet_0.17-18woody3_i386.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-hppa/telnet_0.17-18woody3_hppa.deb stable/main/binary-hppa/telnetd_0.17-18woody3_hppa.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-alpha/telnetd_0.17-18woody3_alpha.deb stable/main/binary-alpha/telnet_0.17-18woody3_alpha.deb netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-mipsel/telnet_0.17-18woody3_mipsel.deb stable/main/source/netkit-telnet_0.17-18woody3.diff.gz stable/main/binary-mipsel/telnetd_0.17-18woody3_mipsel.deb stable/main/source/netkit-telnet_0.17-18woody3.dsc netkit-telnet (0.17-18woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix a buffer overflow in slc_add_reply() [telnet/telnet.cc, CAN-2005-0469] stable/main/binary-sparc/rwhod_0.17-4woody2_sparc.deb stable/main/binary-sparc/rwho_0.17-4woody2_sparc.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-s390/rwho_0.17-4woody2_s390.deb stable/main/binary-s390/rwhod_0.17-4woody2_s390.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-powerpc/rwhod_0.17-4woody2_powerpc.deb stable/main/binary-powerpc/rwho_0.17-4woody2_powerpc.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-mips/rwho_0.17-4woody2_mips.deb stable/main/binary-mips/rwhod_0.17-4woody2_mips.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-m68k/rwhod_0.17-4woody2_m68k.deb stable/main/binary-m68k/rwho_0.17-4woody2_m68k.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-ia64/rwhod_0.17-4woody2_ia64.deb stable/main/binary-ia64/rwho_0.17-4woody2_ia64.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-i386/rwhod_0.17-4woody2_i386.deb stable/main/binary-i386/rwho_0.17-4woody2_i386.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-hppa/rwho_0.17-4woody2_hppa.deb stable/main/binary-hppa/rwhod_0.17-4woody2_hppa.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-arm/rwho_0.17-4woody2_arm.deb stable/main/binary-arm/rwhod_0.17-4woody2_arm.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-alpha/rwho_0.17-4woody2_alpha.deb stable/main/binary-alpha/rwhod_0.17-4woody2_alpha.deb netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/source/netkit-rwho_0.17-4woody2.diff.gz stable/main/binary-mipsel/rwhod_0.17-4woody2_mipsel.deb stable/main/binary-mipsel/rwho_0.17-4woody2_mipsel.deb stable/main/source/netkit-rwho_0.17-4woody2.dsc netkit-rwho (0.17-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Leasened the security precaution a bit [rwhod/rwhod.c, CAN-2004-1180] stable/main/binary-sparc/ipx_2.2.0.18-10woody2_sparc.deb stable/main/binary-sparc/ncpfs_2.2.0.18-10woody2_sparc.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/ipx_2.2.0.18-10woody2_s390.deb stable/main/binary-s390/ncpfs_2.2.0.18-10woody2_s390.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/ncpfs_2.2.0.18-10woody2_powerpc.deb stable/main/binary-powerpc/ipx_2.2.0.18-10woody2_powerpc.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/ipx_2.2.0.18-10woody2_mips.deb stable/main/binary-mips/ncpfs_2.2.0.18-10woody2_mips.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/ncpfs_2.2.0.18-10woody2_m68k.deb stable/main/binary-m68k/ipx_2.2.0.18-10woody2_m68k.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/ipx_2.2.0.18-10woody2_ia64.deb stable/main/binary-ia64/ncpfs_2.2.0.18-10woody2_ia64.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/ncpfs_2.2.0.18-10woody2_i386.deb stable/main/binary-i386/ipx_2.2.0.18-10woody2_i386.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/ipx_2.2.0.18-10woody2_hppa.deb stable/main/binary-hppa/ncpfs_2.2.0.18-10woody2_hppa.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/ncpfs_2.2.0.18-10woody2_arm.deb stable/main/binary-arm/ipx_2.2.0.18-10woody2_arm.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/ncpfs_2.2.0.18-10woody2_alpha.deb stable/main/binary-alpha/ipx_2.2.0.18-10woody2_alpha.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/ipx_2.2.0.18-10woody2_mipsel.deb stable/main/source/ncpfs_2.2.0.18-10woody2.dsc stable/main/source/ncpfs_2.2.0.18-10woody2.diff.gz stable/main/binary-mipsel/ncpfs_2.2.0.18-10woody2_mipsel.deb ncpfs (2.2.0.18-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added ownership check for .nw* file and privilege release for fopen() [lib/ncplib.c, CAN-2005-0013] * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c, util/nwdir.c] * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/nasm_0.98.28cvs-1woody2_sparc.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-s390/nasm_0.98.28cvs-1woody2_s390.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-powerpc/nasm_0.98.28cvs-1woody2_powerpc.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-mipsel/nasm_0.98.28cvs-1woody2_mipsel.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-mips/nasm_0.98.28cvs-1woody2_mips.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-m68k/nasm_0.98.28cvs-1woody2_m68k.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-ia64/nasm_0.98.28cvs-1woody2_ia64.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-hppa/nasm_0.98.28cvs-1woody2_hppa.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-arm/nasm_0.98.28cvs-1woody2_arm.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-alpha/nasm_0.98.28cvs-1woody2_alpha.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/source/nasm_0.98.28cvs-1woody2.dsc stable/main/source/nasm_0.98.28cvs-1woody2.diff.gz stable/main/binary-i386/nasm_0.98.28cvs-1woody2_i386.deb nasm (0.98.28cvs-1woody2) stable-security; urgency=high * Fix broken upload, which was sent to the wrong upload queue. stable/main/binary-sparc/libnmz3_2.0.10-1woody3_sparc.deb stable/main/binary-sparc/namazu2_2.0.10-1woody3_sparc.deb stable/main/binary-sparc/libnmz3-dev_2.0.10-1woody3_sparc.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-s390/namazu2_2.0.10-1woody3_s390.deb stable/main/binary-s390/libnmz3-dev_2.0.10-1woody3_s390.deb stable/main/binary-s390/libnmz3_2.0.10-1woody3_s390.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-powerpc/namazu2_2.0.10-1woody3_powerpc.deb stable/main/binary-powerpc/libnmz3_2.0.10-1woody3_powerpc.deb stable/main/binary-powerpc/libnmz3-dev_2.0.10-1woody3_powerpc.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-mipsel/libnmz3-dev_2.0.10-1woody3_mipsel.deb stable/main/binary-mipsel/libnmz3_2.0.10-1woody3_mipsel.deb stable/main/binary-mipsel/namazu2_2.0.10-1woody3_mipsel.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-mips/libnmz3_2.0.10-1woody3_mips.deb stable/main/binary-mips/namazu2_2.0.10-1woody3_mips.deb stable/main/binary-mips/libnmz3-dev_2.0.10-1woody3_mips.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-m68k/libnmz3_2.0.10-1woody3_m68k.deb stable/main/binary-m68k/libnmz3-dev_2.0.10-1woody3_m68k.deb stable/main/binary-m68k/namazu2_2.0.10-1woody3_m68k.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-ia64/libnmz3-dev_2.0.10-1woody3_ia64.deb stable/main/binary-ia64/namazu2_2.0.10-1woody3_ia64.deb stable/main/binary-ia64/libnmz3_2.0.10-1woody3_ia64.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-hppa/libnmz3-dev_2.0.10-1woody3_hppa.deb stable/main/binary-hppa/libnmz3_2.0.10-1woody3_hppa.deb stable/main/binary-hppa/namazu2_2.0.10-1woody3_hppa.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-arm/libnmz3-dev_2.0.10-1woody3_arm.deb stable/main/binary-arm/namazu2_2.0.10-1woody3_arm.deb stable/main/binary-arm/libnmz3_2.0.10-1woody3_arm.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-alpha/namazu2_2.0.10-1woody3_alpha.deb stable/main/binary-alpha/libnmz3-dev_2.0.10-1woody3_alpha.deb stable/main/binary-alpha/libnmz3_2.0.10-1woody3_alpha.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-i386/libnmz3-dev_2.0.10-1woody3_i386.deb stable/main/binary-i386/namazu2_2.0.10-1woody3_i386.deb stable/main/source/namazu2_2.0.10-1woody3.dsc stable/main/binary-all/namazu2-common_2.0.10-1woody3_all.deb stable/main/source/namazu2_2.0.10-1woody3.diff.gz stable/main/binary-i386/libnmz3_2.0.10-1woody3_i386.deb stable/main/binary-all/namazu2-index-tools_2.0.10-1woody3_all.deb namazu2 (2.0.10-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restricted build-dependency to tk8.2 so that buildds have a chance to select a wish implementation. stable/main/binary-sparc/mysql-client_3.23.49-8.11_sparc.deb stable/main/binary-sparc/libmysqlclient10_3.23.49-8.11_sparc.deb stable/main/binary-sparc/mysql-server_3.23.49-8.11_sparc.deb stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.11_sparc.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-s390/mysql-client_3.23.49-8.11_s390.deb stable/main/binary-s390/libmysqlclient10_3.23.49-8.11_s390.deb stable/main/binary-s390/mysql-server_3.23.49-8.11_s390.deb stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.11_s390.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.11_powerpc.deb stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.11_powerpc.deb stable/main/binary-powerpc/mysql-server_3.23.49-8.11_powerpc.deb stable/main/binary-powerpc/mysql-client_3.23.49-8.11_powerpc.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-mipsel/mysql-server_3.23.49-8.11_mipsel.deb stable/main/binary-mipsel/mysql-client_3.23.49-8.11_mipsel.deb stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.11_mipsel.deb stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.11_mipsel.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-mips/libmysqlclient10_3.23.49-8.11_mips.deb stable/main/binary-mips/mysql-server_3.23.49-8.11_mips.deb stable/main/binary-mips/mysql-client_3.23.49-8.11_mips.deb stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.11_mips.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-m68k/mysql-server_3.23.49-8.11_m68k.deb stable/main/binary-m68k/libmysqlclient10_3.23.49-8.11_m68k.deb stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.11_m68k.deb stable/main/binary-m68k/mysql-client_3.23.49-8.11_m68k.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-ia64/mysql-server_3.23.49-8.11_ia64.deb stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.11_ia64.deb stable/main/binary-ia64/mysql-client_3.23.49-8.11_ia64.deb stable/main/binary-ia64/libmysqlclient10_3.23.49-8.11_ia64.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.11_i386.deb stable/main/binary-i386/mysql-client_3.23.49-8.11_i386.deb stable/main/binary-i386/mysql-server_3.23.49-8.11_i386.deb stable/main/binary-i386/libmysqlclient10_3.23.49-8.11_i386.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-hppa/mysql-server_3.23.49-8.11_hppa.deb stable/main/binary-hppa/libmysqlclient10_3.23.49-8.11_hppa.deb stable/main/binary-hppa/mysql-client_3.23.49-8.11_hppa.deb stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.11_hppa.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-alpha/mysql-server_3.23.49-8.11_alpha.deb stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.11_alpha.deb stable/main/binary-alpha/mysql-client_3.23.49-8.11_alpha.deb stable/main/binary-alpha/libmysqlclient10_3.23.49-8.11_alpha.deb mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-arm/mysql-client_3.23.49-8.11_arm.deb stable/main/binary-all/mysql-common_3.23.49-8.11_all.deb stable/main/binary-arm/libmysqlclient10_3.23.49-8.11_arm.deb stable/main/source/mysql_3.23.49-8.11.dsc stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.11_arm.deb stable/main/binary-arm/mysql-server_3.23.49-8.11_arm.deb stable/main/source/mysql_3.23.49-8.11.diff.gz mysql (3.23.49-8.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added important fix digged out by Tom Lane for the patch below that will initialise a variable [sql/ha_myisam.cc, debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff] stable/main/binary-sparc/libmm11-dev_1.1.3-6.3_sparc.deb stable/main/binary-sparc/libmm11_1.1.3-6.3_sparc.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-s390/libmm11_1.1.3-6.3_s390.deb stable/main/binary-s390/libmm11-dev_1.1.3-6.3_s390.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-powerpc/libmm11-dev_1.1.3-6.3_powerpc.deb stable/main/binary-powerpc/libmm11_1.1.3-6.3_powerpc.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-mipsel/libmm11_1.1.3-6.3_mipsel.deb stable/main/binary-mipsel/libmm11-dev_1.1.3-6.3_mipsel.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-mips/libmm11_1.1.3-6.3_mips.deb stable/main/binary-mips/libmm11-dev_1.1.3-6.3_mips.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-m68k/libmm11-dev_1.1.3-6.3_m68k.deb stable/main/binary-m68k/libmm11_1.1.3-6.3_m68k.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-ia64/libmm11_1.1.3-6.3_ia64.deb stable/main/binary-ia64/libmm11-dev_1.1.3-6.3_ia64.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-hppa/libmm11_1.1.3-6.3_hppa.deb stable/main/binary-hppa/libmm11-dev_1.1.3-6.3_hppa.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-arm/libmm11_1.1.3-6.3_arm.deb stable/main/binary-arm/libmm11-dev_1.1.3-6.3_arm.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-alpha/libmm11_1.1.3-6.3_alpha.deb stable/main/binary-alpha/libmm11-dev_1.1.3-6.3_alpha.deb mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-i386/libmm11-dev_1.1.3-6.3_i386.deb stable/main/source/mm_1.1.3-6.3.dsc stable/main/binary-i386/libmm11_1.1.3-6.3_i386.deb stable/main/source/mm_1.1.3-6.3.diff.gz mm (1.1.3-6.3) stable; urgency=low * Force the use of System V shared memory instead: it was the more usual choice before and many Apache configurations can't cope if the backing store for MMFILE gets allocated (closes: #280233, #280871, #282787). This reverts the previous change. stable/main/binary-sparc/mc_4.5.55-1.2woody6_sparc.deb stable/main/binary-sparc/mc-common_4.5.55-1.2woody6_sparc.deb stable/main/binary-sparc/gmc_4.5.55-1.2woody6_sparc.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-s390/mc_4.5.55-1.2woody6_s390.deb stable/main/binary-s390/mc-common_4.5.55-1.2woody6_s390.deb stable/main/binary-s390/gmc_4.5.55-1.2woody6_s390.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-powerpc/mc_4.5.55-1.2woody6_powerpc.deb stable/main/binary-powerpc/gmc_4.5.55-1.2woody6_powerpc.deb stable/main/binary-powerpc/mc-common_4.5.55-1.2woody6_powerpc.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-mipsel/mc-common_4.5.55-1.2woody6_mipsel.deb stable/main/binary-mipsel/mc_4.5.55-1.2woody6_mipsel.deb stable/main/binary-mipsel/gmc_4.5.55-1.2woody6_mipsel.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-mips/mc_4.5.55-1.2woody6_mips.deb stable/main/binary-mips/gmc_4.5.55-1.2woody6_mips.deb stable/main/binary-mips/mc-common_4.5.55-1.2woody6_mips.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-m68k/gmc_4.5.55-1.2woody6_m68k.deb stable/main/binary-m68k/mc_4.5.55-1.2woody6_m68k.deb stable/main/binary-m68k/mc-common_4.5.55-1.2woody6_m68k.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-ia64/mc-common_4.5.55-1.2woody6_ia64.deb stable/main/binary-ia64/gmc_4.5.55-1.2woody6_ia64.deb stable/main/binary-ia64/mc_4.5.55-1.2woody6_ia64.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-i386/mc-common_4.5.55-1.2woody6_i386.deb stable/main/binary-i386/gmc_4.5.55-1.2woody6_i386.deb stable/main/binary-i386/mc_4.5.55-1.2woody6_i386.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-hppa/mc_4.5.55-1.2woody6_hppa.deb stable/main/binary-hppa/mc-common_4.5.55-1.2woody6_hppa.deb stable/main/binary-hppa/gmc_4.5.55-1.2woody6_hppa.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-alpha/gmc_4.5.55-1.2woody6_alpha.deb stable/main/binary-alpha/mc_4.5.55-1.2woody6_alpha.deb stable/main/binary-alpha/mc-common_4.5.55-1.2woody6_alpha.deb mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-arm/mc_4.5.55-1.2woody6_arm.deb stable/main/binary-arm/mc-common_4.5.55-1.2woody6_arm.deb stable/main/source/mc_4.5.55-1.2woody6.dsc stable/main/binary-arm/gmc_4.5.55-1.2woody6_arm.deb stable/main/source/mc_4.5.55-1.2woody6.diff.gz mc (4.5.55-1.2woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew V. Samoilov to fix regression in buffer overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366, debian/patches/52_security_CAN-2004-0226_fix.diff] * Applied patch by Andrew V. Samoilov to fix another buffer overflow [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff] stable/main/binary-sparc/mailman_2.0.11-1woody11_sparc.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-s390/mailman_2.0.11-1woody11_s390.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-powerpc/mailman_2.0.11-1woody11_powerpc.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-mips/mailman_2.0.11-1woody11_mips.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-m68k/mailman_2.0.11-1woody11_m68k.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-ia64/mailman_2.0.11-1woody11_ia64.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-i386/mailman_2.0.11-1woody11_i386.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-hppa/mailman_2.0.11-1woody11_hppa.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-arm/mailman_2.0.11-1woody11_arm.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-alpha/mailman_2.0.11-1woody11_alpha.deb mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-mipsel/mailman_2.0.11-1woody11_mipsel.deb stable/main/source/mailman_2.0.11-1woody11.diff.gz stable/main/source/mailman_2.0.11-1woody11.dsc mailman (2.0.11-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will work with Python 1.5 as well since that's the lowest requirement for mailman in Debian/stable and since Python 1.5.2 doesn't do list comprehensions [Mailman/Cgi/private.py] stable/main/binary-i386/luxman_0.41-17.2_i386.deb stable/main/source/luxman_0.41-17.2.dsc stable/main/source/luxman_0.41-17.2.diff.gz luxman (0.41-17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix buffer overflow that can lead to a local root exploit [gtools/util.cc, CAN-2005-0385] stable/main/binary-all/lintian_1.20.17.1_all.deb stable/main/source/lintian_1.20.17.1.dsc stable/main/source/lintian_1.20.17.1.tar.gz lintian (1.20.17.1) stable-security; urgency=high * New-Maintainer upload for the Security Team * Fix insecure removal of files if lintian failed to create a temporary lab [frontend/lintian, CAN-2004-1000] (Closes: #286681) stable/main/binary-sparc/linpopup_1.2.0-2woody1_sparc.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-s390/linpopup_1.2.0-2woody1_s390.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-powerpc/linpopup_1.2.0-2woody1_powerpc.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-mipsel/linpopup_1.2.0-2woody1_mipsel.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-mips/linpopup_1.2.0-2woody1_mips.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-m68k/linpopup_1.2.0-2woody1_m68k.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-ia64/linpopup_1.2.0-2woody1_ia64.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-hppa/linpopup_1.2.0-2woody1_hppa.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-arm/linpopup_1.2.0-2woody1_arm.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-alpha/linpopup_1.2.0-2woody1_alpha.deb linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/source/linpopup_1.2.0-2woody1.diff.gz stable/main/binary-i386/linpopup_1.2.0-2woody1_i386.deb stable/main/source/linpopup_1.2.0-2woody1.dsc linpopup (1.2.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fixed buffer overflow in string expansion. [string.c, CAN-2004-1282] stable/main/binary-sparc/libpam-radius-auth_1.3.14-1.3_sparc.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-s390/libpam-radius-auth_1.3.14-1.3_s390.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-powerpc/libpam-radius-auth_1.3.14-1.3_powerpc.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-mips/libpam-radius-auth_1.3.14-1.3_mips.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-m68k/libpam-radius-auth_1.3.14-1.3_m68k.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-ia64/libpam-radius-auth_1.3.14-1.3_ia64.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-i386/libpam-radius-auth_1.3.14-1.3_i386.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-hppa/libpam-radius-auth_1.3.14-1.3_hppa.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-arm/libpam-radius-auth_1.3.14-1.3_arm.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-alpha/libpam-radius-auth_1.3.14-1.3_alpha.deb libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/source/libpam-radius-auth_1.3.14-1.3.diff.gz stable/main/binary-mipsel/libpam-radius-auth_1.3.14-1.3_mipsel.deb stable/main/source/libpam-radius-auth_1.3.14-1.3.dsc libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix information leak [debian/preinst, debian/rules, CAN-2004-1340] * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108] stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody4_sparc.deb stable/main/binary-sparc/libgd1_1.8.4-17.woody4_sparc.deb stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody4_sparc.deb stable/main/binary-sparc/libgd-dev_1.8.4-17.woody4_sparc.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody4_s390.deb stable/main/binary-s390/libgd-dev_1.8.4-17.woody4_s390.deb stable/main/binary-s390/libgd1_1.8.4-17.woody4_s390.deb stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody4_s390.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody4_powerpc.deb stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody4_powerpc.deb stable/main/binary-powerpc/libgd1_1.8.4-17.woody4_powerpc.deb stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody4_powerpc.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody4_mips.deb stable/main/binary-mips/libgd1_1.8.4-17.woody4_mips.deb stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody4_mips.deb stable/main/binary-mips/libgd-dev_1.8.4-17.woody4_mips.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-m68k/libgd1_1.8.4-17.woody4_m68k.deb stable/main/binary-m68k/libgd-dev_1.8.4-17.woody4_m68k.deb stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody4_m68k.deb stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody4_m68k.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-ia64/libgd-dev_1.8.4-17.woody4_ia64.deb stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody4_ia64.deb stable/main/binary-ia64/libgd1_1.8.4-17.woody4_ia64.deb stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody4_ia64.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody4_i386.deb stable/main/binary-i386/libgd-dev_1.8.4-17.woody4_i386.deb stable/main/binary-i386/libgd1_1.8.4-17.woody4_i386.deb stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody4_i386.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody4_hppa.deb stable/main/binary-hppa/libgd-dev_1.8.4-17.woody4_hppa.deb stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody4_hppa.deb stable/main/binary-hppa/libgd1_1.8.4-17.woody4_hppa.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-arm/libgd1_1.8.4-17.woody4_arm.deb stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody4_arm.deb stable/main/binary-arm/libgd-dev_1.8.4-17.woody4_arm.deb stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody4_arm.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-alpha/libgd1_1.8.4-17.woody4_alpha.deb stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody4_alpha.deb stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody4_alpha.deb stable/main/binary-alpha/libgd-dev_1.8.4-17.woody4_alpha.deb libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody4_mipsel.deb stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody4_mipsel.deb stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody4_mipsel.deb stable/main/source/libgd_1.8.4-17.woody4.diff.gz stable/main/binary-mipsel/libgd1_1.8.4-17.woody4_mipsel.deb stable/main/source/libgd_1.8.4-17.woody4.dsc libgd (1.8.4-17.woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] stable/main/binary-sparc/libdbi-perl_1.21-2woody2_sparc.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-s390/libdbi-perl_1.21-2woody2_s390.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-powerpc/libdbi-perl_1.21-2woody2_powerpc.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-mips/libdbi-perl_1.21-2woody2_mips.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-m68k/libdbi-perl_1.21-2woody2_m68k.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-ia64/libdbi-perl_1.21-2woody2_ia64.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-i386/libdbi-perl_1.21-2woody2_i386.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-hppa/libdbi-perl_1.21-2woody2_hppa.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-arm/libdbi-perl_1.21-2woody2_arm.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-alpha/libdbi-perl_1.21-2woody2_alpha.deb libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/source/libdbi-perl_1.21-2woody2.diff.gz stable/main/binary-mipsel/libdbi-perl_1.21-2woody2_mipsel.deb stable/main/source/libdbi-perl_1.21-2woody2.dsc libdbi-perl (1.21-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to not create an insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm, CAN-2005-0077] stable/main/binary-sparc/libapache-mod-python_2.7.8-0.0woody5_sparc.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-s390/libapache-mod-python_2.7.8-0.0woody5_s390.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-powerpc/libapache-mod-python_2.7.8-0.0woody5_powerpc.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-mips/libapache-mod-python_2.7.8-0.0woody5_mips.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-m68k/libapache-mod-python_2.7.8-0.0woody5_m68k.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-ia64/libapache-mod-python_2.7.8-0.0woody5_ia64.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-i386/libapache-mod-python_2.7.8-0.0woody5_i386.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-hppa/libapache-mod-python_2.7.8-0.0woody5_hppa.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-arm/libapache-mod-python_2.7.8-0.0woody5_arm.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-alpha/libapache-mod-python_2.7.8-0.0woody5_alpha.deb libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/source/libapache-mod-python_2.7.8-0.0woody5.diff.gz stable/main/binary-mipsel/libapache-mod-python_2.7.8-0.0woody5_mipsel.deb stable/main/source/libapache-mod-python_2.7.8-0.0woody5.dsc libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * No-changes upload because I can't get wanna-build to accept the fact that the buildd hasn't uploaded it since the files were empty due to klecker being out of space. stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody8_sparc.deb stable/main/binary-sparc/libkadm55_1.2.4-5woody8_sparc.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody8_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody8_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-admin-server_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody8_s390.deb stable/main/binary-s390/libkrb5-dev_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-kdc_1.2.4-5woody8_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody8_s390.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-powerpc/libkadm55_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody8_powerpc.deb stable/main/binary-powerpc/libkrb53_1.2.4-5woody8_powerpc.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-mipsel/libkrb53_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody8_mipsel.deb stable/main/binary-mipsel/libkadm55_1.2.4-5woody8_mipsel.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-mips/libkadm55_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody8_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody8_mips.deb stable/main/binary-mips/libkrb53_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody8_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody8_mips.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-m68k/krb5-kdc_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-user_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody8_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody8_m68k.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-ia64/libkrb53_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/libkadm55_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody8_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody8_ia64.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-hppa/libkadm55_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/libkrb53_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-kdc_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody8_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody8_hppa.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-arm/krb5-kdc_1.2.4-5woody8_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody8_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-telnetd_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-user_1.2.4-5woody8_arm.deb stable/main/binary-arm/krb5-admin-server_1.2.4-5woody8_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody8_arm.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-alpha/krb5-user_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody8_alpha.deb stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody8_alpha.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-i386/krb5-telnetd_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-ftpd_1.2.4-5woody8_i386.deb stable/main/source/krb5_1.2.4-5woody8.diff.gz stable/main/binary-i386/libkrb5-dev_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody8_i386.deb stable/main/binary-i386/libkrb53_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody8_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-clients_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody8_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody8_i386.deb stable/main/source/krb5_1.2.4-5woody8.dsc stable/main/binary-all/krb5-doc_1.2.4-5woody8_all.deb krb5 (1.2.4-5woody8) stable-security; urgency=low * Fixbuffer overflow in slc_add_reply in telnet.c (CAN-2005-0469) * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 ) * Note that both of these vulnerabilities are client-side vulnerabilities that can be exploited only by a server. stable/main/binary-sparc/libkdenetwork1_2.2.2-14.7_sparc.deb stable/main/binary-sparc/ktalkd_2.2.2-14.7_sparc.deb stable/main/binary-sparc/knewsticker_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kmail_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kppp_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdict_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libmimelib-dev_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kit_2.2.2-14.7_sparc.deb stable/main/binary-sparc/korn_2.2.2-14.7_sparc.deb stable/main/binary-sparc/ksirc_2.2.2-14.7_sparc.deb stable/main/binary-sparc/klisa_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libmimelib1_2.2.2-14.7_sparc.deb stable/main/binary-sparc/knode_2.2.2-14.7_sparc.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-s390/kmail_2.2.2-14.7_s390.deb stable/main/binary-s390/libmimelib1_2.2.2-14.7_s390.deb stable/main/binary-s390/kppp_2.2.2-14.7_s390.deb stable/main/binary-s390/libkdenetwork1_2.2.2-14.7_s390.deb stable/main/binary-s390/ktalkd_2.2.2-14.7_s390.deb stable/main/binary-s390/korn_2.2.2-14.7_s390.deb stable/main/binary-s390/knode_2.2.2-14.7_s390.deb stable/main/binary-s390/kit_2.2.2-14.7_s390.deb stable/main/binary-s390/kdict_2.2.2-14.7_s390.deb stable/main/binary-s390/ksirc_2.2.2-14.7_s390.deb stable/main/binary-s390/libmimelib-dev_2.2.2-14.7_s390.deb stable/main/binary-s390/knewsticker_2.2.2-14.7_s390.deb stable/main/binary-s390/klisa_2.2.2-14.7_s390.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-powerpc/knewsticker_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/ksirc_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kit_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/korn_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kppp_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kmail_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdict_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libmimelib1_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/klisa_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/knode_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/ktalkd_2.2.2-14.7_powerpc.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-mipsel/ktalkd_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/knode_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/korn_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kppp_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/ksirc_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/klisa_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdict_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kit_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libmimelib1_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kmail_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/knewsticker_2.2.2-14.7_mipsel.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-mips/libmimelib1_2.2.2-14.7_mips.deb stable/main/binary-mips/klisa_2.2.2-14.7_mips.deb stable/main/binary-mips/libkdenetwork1_2.2.2-14.7_mips.deb stable/main/binary-mips/korn_2.2.2-14.7_mips.deb stable/main/binary-mips/knode_2.2.2-14.7_mips.deb stable/main/binary-mips/kmail_2.2.2-14.7_mips.deb stable/main/binary-mips/kppp_2.2.2-14.7_mips.deb stable/main/binary-mips/knewsticker_2.2.2-14.7_mips.deb stable/main/binary-mips/libmimelib-dev_2.2.2-14.7_mips.deb stable/main/binary-mips/kdict_2.2.2-14.7_mips.deb stable/main/binary-mips/kit_2.2.2-14.7_mips.deb stable/main/binary-mips/ktalkd_2.2.2-14.7_mips.deb stable/main/binary-mips/ksirc_2.2.2-14.7_mips.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-m68k/libkdenetwork1_2.2.2-14.7_m68k.deb stable/main/binary-m68k/klisa_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libmimelib1_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kmail_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libmimelib-dev_2.2.2-14.7_m68k.deb stable/main/binary-m68k/knewsticker_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kit_2.2.2-14.7_m68k.deb stable/main/binary-m68k/korn_2.2.2-14.7_m68k.deb stable/main/binary-m68k/ktalkd_2.2.2-14.7_m68k.deb stable/main/binary-m68k/knode_2.2.2-14.7_m68k.deb stable/main/binary-m68k/ksirc_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdict_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kppp_2.2.2-14.7_m68k.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-ia64/kmail_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libmimelib-dev_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kppp_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libkdenetwork1_2.2.2-14.7_ia64.deb stable/main/binary-ia64/knewsticker_2.2.2-14.7_ia64.deb stable/main/binary-ia64/korn_2.2.2-14.7_ia64.deb stable/main/binary-ia64/klisa_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libmimelib1_2.2.2-14.7_ia64.deb stable/main/binary-ia64/ksirc_2.2.2-14.7_ia64.deb stable/main/binary-ia64/ktalkd_2.2.2-14.7_ia64.deb stable/main/binary-ia64/knode_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kit_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdict_2.2.2-14.7_ia64.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-hppa/libmimelib1_2.2.2-14.7_hppa.deb stable/main/binary-hppa/knode_2.2.2-14.7_hppa.deb stable/main/binary-hppa/ksirc_2.2.2-14.7_hppa.deb stable/main/binary-hppa/ktalkd_2.2.2-14.7_hppa.deb stable/main/binary-hppa/klisa_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kmail_2.2.2-14.7_hppa.deb stable/main/binary-hppa/knewsticker_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdict_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kit_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libkdenetwork1_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kppp_2.2.2-14.7_hppa.deb stable/main/binary-hppa/korn_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libmimelib-dev_2.2.2-14.7_hppa.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-arm/libkdenetwork1_2.2.2-14.7_arm.deb stable/main/binary-arm/klisa_2.2.2-14.7_arm.deb stable/main/binary-arm/kdict_2.2.2-14.7_arm.deb stable/main/binary-arm/kmail_2.2.2-14.7_arm.deb stable/main/binary-arm/korn_2.2.2-14.7_arm.deb stable/main/binary-arm/knewsticker_2.2.2-14.7_arm.deb stable/main/binary-arm/ktalkd_2.2.2-14.7_arm.deb stable/main/binary-arm/knode_2.2.2-14.7_arm.deb stable/main/binary-arm/kit_2.2.2-14.7_arm.deb stable/main/binary-arm/ksirc_2.2.2-14.7_arm.deb stable/main/binary-arm/libmimelib-dev_2.2.2-14.7_arm.deb stable/main/binary-arm/kppp_2.2.2-14.7_arm.deb stable/main/binary-arm/libmimelib1_2.2.2-14.7_arm.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-alpha/knode_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libkdenetwork1_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kit_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kppp_2.2.2-14.7_alpha.deb stable/main/binary-alpha/klisa_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libmimelib-dev_2.2.2-14.7_alpha.deb stable/main/binary-alpha/knewsticker_2.2.2-14.7_alpha.deb stable/main/binary-alpha/ktalkd_2.2.2-14.7_alpha.deb stable/main/binary-alpha/korn_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kmail_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdict_2.2.2-14.7_alpha.deb stable/main/binary-alpha/ksirc_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libmimelib1_2.2.2-14.7_alpha.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-i386/ksirc_2.2.2-14.7_i386.deb stable/main/binary-i386/libmimelib-dev_2.2.2-14.7_i386.deb stable/main/binary-i386/libmimelib1_2.2.2-14.7_i386.deb stable/main/source/kdenetwork_2.2.2-14.7.dsc stable/main/binary-i386/kit_2.2.2-14.7_i386.deb stable/main/source/kdenetwork_2.2.2-14.7.diff.gz stable/main/binary-i386/kmail_2.2.2-14.7_i386.deb stable/main/binary-i386/kdict_2.2.2-14.7_i386.deb stable/main/binary-i386/klisa_2.2.2-14.7_i386.deb stable/main/binary-i386/knode_2.2.2-14.7_i386.deb stable/main/binary-i386/ktalkd_2.2.2-14.7_i386.deb stable/main/binary-i386/libkdenetwork1_2.2.2-14.7_i386.deb stable/main/binary-i386/korn_2.2.2-14.7_i386.deb stable/main/binary-i386/knewsticker_2.2.2-14.7_i386.deb stable/main/binary-i386/kppp_2.2.2-14.7_i386.deb kdenetwork (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Dirk Müller to fix file descriptor leak [kppp/main.cpp, CAN-2005-0205] stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.13_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.13_sparc.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libarts_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.13_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.13_s390.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-powerpc/libkmid_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.13_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.13_powerpc.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.13_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.13_mipsel.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.13_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.13_mips.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/libkmid_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.13_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.13_m68k.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libkmid_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.13_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.13_ia64.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.13_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.13_hppa.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libarts_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.13_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.13_arm.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.13_alpha.deb stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.13_alpha.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/source/kdelibs_2.2.2-13.woody.13.diff.gz stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/libkmid_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/libarts_2.2.2-13.woody.13_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.13_i386.deb stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.13_all.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.13_i386.deb stable/main/source/kdelibs_2.2.2-13.woody.13.dsc stable/main/binary-i386/libarts-dev_2.2.2-13.woody.13_i386.deb kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary FTP command execution [kio/ftp/ftp.cc, CAN-2004-1165] stable/main/binary-sparc/kdm_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kscreensaver_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kdebase-libs_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kdebase-dev_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kate_2.2.2-14.9_sparc.deb stable/main/binary-sparc/libkonq3_2.2.2-14.9_sparc.deb stable/main/binary-sparc/libkonq-dev_2.2.2-14.9_sparc.deb stable/main/binary-sparc/konsole_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.9_sparc.deb stable/main/binary-sparc/konqueror_2.2.2-14.9_sparc.deb stable/main/binary-sparc/kdebase_2.2.2-14.9_sparc.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-s390/libkonq3_2.2.2-14.9_s390.deb stable/main/binary-s390/konsole_2.2.2-14.9_s390.deb stable/main/binary-s390/kdebase_2.2.2-14.9_s390.deb stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.9_s390.deb stable/main/binary-s390/kscreensaver_2.2.2-14.9_s390.deb stable/main/binary-s390/kdebase-dev_2.2.2-14.9_s390.deb stable/main/binary-s390/kdebase-libs_2.2.2-14.9_s390.deb stable/main/binary-s390/kate_2.2.2-14.9_s390.deb stable/main/binary-s390/libkonq-dev_2.2.2-14.9_s390.deb stable/main/binary-s390/konqueror_2.2.2-14.9_s390.deb stable/main/binary-s390/kdm_2.2.2-14.9_s390.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-powerpc/konqueror_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kdebase-libs_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/libkonq3_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/libkonq-dev_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kdebase_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kate_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/konsole_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kscreensaver_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kdm_2.2.2-14.9_powerpc.deb stable/main/binary-powerpc/kdebase-dev_2.2.2-14.9_powerpc.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-mipsel/libkonq-dev_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/libkonq3_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kscreensaver_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kdm_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kdebase-dev_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/konsole_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kdebase_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/konqueror_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kdebase-libs_2.2.2-14.9_mipsel.deb stable/main/binary-mipsel/kate_2.2.2-14.9_mipsel.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-mips/konqueror_2.2.2-14.9_mips.deb stable/main/binary-mips/kate_2.2.2-14.9_mips.deb stable/main/binary-mips/libkonq3_2.2.2-14.9_mips.deb stable/main/binary-mips/kdm_2.2.2-14.9_mips.deb stable/main/binary-mips/kdebase_2.2.2-14.9_mips.deb stable/main/binary-mips/kscreensaver_2.2.2-14.9_mips.deb stable/main/binary-mips/libkonq-dev_2.2.2-14.9_mips.deb stable/main/binary-mips/kdebase-libs_2.2.2-14.9_mips.deb stable/main/binary-mips/konsole_2.2.2-14.9_mips.deb stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.9_mips.deb stable/main/binary-mips/kdebase-dev_2.2.2-14.9_mips.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-m68k/konqueror_2.2.2-14.9_m68k.deb stable/main/binary-m68k/libkonq-dev_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kdm_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kdebase_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kdebase-dev_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kate_2.2.2-14.9_m68k.deb stable/main/binary-m68k/libkonq3_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kscreensaver_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.9_m68k.deb stable/main/binary-m68k/kdebase-libs_2.2.2-14.9_m68k.deb stable/main/binary-m68k/konsole_2.2.2-14.9_m68k.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-ia64/kdm_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kscreensaver_2.2.2-14.9_ia64.deb stable/main/binary-ia64/konsole_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kdebase_2.2.2-14.9_ia64.deb stable/main/binary-ia64/libkonq-dev_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kate_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kdebase-dev_2.2.2-14.9_ia64.deb stable/main/binary-ia64/libkonq3_2.2.2-14.9_ia64.deb stable/main/binary-ia64/kdebase-libs_2.2.2-14.9_ia64.deb stable/main/binary-ia64/konqueror_2.2.2-14.9_ia64.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-hppa/kdebase_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kdm_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kate_2.2.2-14.9_hppa.deb stable/main/binary-hppa/konqueror_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kdebase-dev_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.9_hppa.deb stable/main/binary-hppa/libkonq3_2.2.2-14.9_hppa.deb stable/main/binary-hppa/libkonq-dev_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kscreensaver_2.2.2-14.9_hppa.deb stable/main/binary-hppa/konsole_2.2.2-14.9_hppa.deb stable/main/binary-hppa/kdebase-libs_2.2.2-14.9_hppa.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-arm/kate_2.2.2-14.9_arm.deb stable/main/binary-arm/kdebase-dev_2.2.2-14.9_arm.deb stable/main/binary-arm/kdebase-libs_2.2.2-14.9_arm.deb stable/main/binary-arm/kdm_2.2.2-14.9_arm.deb stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.9_arm.deb stable/main/binary-arm/konsole_2.2.2-14.9_arm.deb stable/main/binary-arm/kdebase_2.2.2-14.9_arm.deb stable/main/binary-arm/libkonq-dev_2.2.2-14.9_arm.deb stable/main/binary-arm/kscreensaver_2.2.2-14.9_arm.deb stable/main/binary-arm/konqueror_2.2.2-14.9_arm.deb stable/main/binary-arm/libkonq3_2.2.2-14.9_arm.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-alpha/konsole_2.2.2-14.9_alpha.deb stable/main/binary-alpha/libkonq3_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kdebase_2.2.2-14.9_alpha.deb stable/main/binary-alpha/libkonq-dev_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kate_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kdebase-dev_2.2.2-14.9_alpha.deb stable/main/binary-alpha/konqueror_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kscreensaver_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kdm_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.9_alpha.deb stable/main/binary-alpha/kdebase-libs_2.2.2-14.9_alpha.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-all/kdewallpapers_2.2.2-14.9_all.deb stable/main/binary-i386/kscreensaver_2.2.2-14.9_i386.deb stable/main/source/kdebase_2.2.2-14.9.dsc stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.9_i386.deb stable/main/binary-i386/kdebase-dev_2.2.2-14.9_i386.deb stable/main/source/kdebase_2.2.2-14.9.diff.gz stable/main/binary-i386/libkonq-dev_2.2.2-14.9_i386.deb stable/main/binary-all/kdebase-doc_2.2.2-14.9_all.deb stable/main/binary-i386/kdebase_2.2.2-14.9_i386.deb stable/main/binary-i386/kdm_2.2.2-14.9_i386.deb stable/main/binary-i386/konsole_2.2.2-14.9_i386.deb stable/main/binary-i386/kdebase-libs_2.2.2-14.9_i386.deb stable/main/binary-i386/libkonq3_2.2.2-14.9_i386.deb stable/main/binary-i386/konqueror_2.2.2-14.9_i386.deb stable/main/binary-i386/kate_2.2.2-14.9_i386.deb kdebase (4:2.2.2-14.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Raphaël Enrici to fix password bypass in certain conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078] stable/main/binary-sparc/libimlib2-dev_1.0.5-2woody2_sparc.deb stable/main/binary-sparc/libimlib2_1.0.5-2woody2_sparc.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-s390/libimlib2-dev_1.0.5-2woody2_s390.deb stable/main/binary-s390/libimlib2_1.0.5-2woody2_s390.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-powerpc/libimlib2-dev_1.0.5-2woody2_powerpc.deb stable/main/binary-powerpc/libimlib2_1.0.5-2woody2_powerpc.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-mips/libimlib2-dev_1.0.5-2woody2_mips.deb stable/main/binary-mips/libimlib2_1.0.5-2woody2_mips.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-m68k/libimlib2_1.0.5-2woody2_m68k.deb stable/main/binary-m68k/libimlib2-dev_1.0.5-2woody2_m68k.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-ia64/libimlib2-dev_1.0.5-2woody2_ia64.deb stable/main/binary-ia64/libimlib2_1.0.5-2woody2_ia64.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-i386/libimlib2_1.0.5-2woody2_i386.deb stable/main/binary-i386/libimlib2-dev_1.0.5-2woody2_i386.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-hppa/libimlib2-dev_1.0.5-2woody2_hppa.deb stable/main/binary-hppa/libimlib2_1.0.5-2woody2_hppa.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-arm/libimlib2_1.0.5-2woody2_arm.deb stable/main/binary-arm/libimlib2-dev_1.0.5-2woody2_arm.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-alpha/libimlib2_1.0.5-2woody2_alpha.deb stable/main/binary-alpha/libimlib2-dev_1.0.5-2woody2_alpha.deb imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-mipsel/libimlib2-dev_1.0.5-2woody2_mipsel.deb stable/main/source/imlib2_1.0.5-2woody2.dsc stable/main/binary-mipsel/libimlib2_1.0.5-2woody2_mipsel.deb stable/main/source/imlib2_1.0.5-2woody2.diff.gz imlib2 (1.0.5-2woody2) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Backported patch from imlib to integer overflows [loaders/loader_xpm.c, CAN-2004-1026] stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody6_sparc.deb stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody6_sparc.deb stable/main/binary-sparc/libmagick5_5.4.4.5-1woody6_sparc.deb stable/main/binary-sparc/perlmagick_5.4.4.5-1woody6_sparc.deb stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody6_sparc.deb stable/main/binary-sparc/imagemagick_5.4.4.5-1woody6_sparc.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody6_s390.deb stable/main/binary-s390/libmagick++5_5.4.4.5-1woody6_s390.deb stable/main/binary-s390/imagemagick_5.4.4.5-1woody6_s390.deb stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody6_s390.deb stable/main/binary-s390/perlmagick_5.4.4.5-1woody6_s390.deb stable/main/binary-s390/libmagick5_5.4.4.5-1woody6_s390.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody6_powerpc.deb stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody6_powerpc.deb stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody6_powerpc.deb stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody6_powerpc.deb stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody6_powerpc.deb stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody6_powerpc.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody6_mipsel.deb stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody6_mipsel.deb stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody6_mipsel.deb stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody6_mipsel.deb stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody6_mipsel.deb stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody6_mipsel.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-mips/perlmagick_5.4.4.5-1woody6_mips.deb stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody6_mips.deb stable/main/binary-mips/libmagick5_5.4.4.5-1woody6_mips.deb stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody6_mips.deb stable/main/binary-mips/imagemagick_5.4.4.5-1woody6_mips.deb stable/main/binary-mips/libmagick++5_5.4.4.5-1woody6_mips.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-m68k/libmagick5_5.4.4.5-1woody6_m68k.deb stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody6_m68k.deb stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody6_m68k.deb stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody6_m68k.deb stable/main/binary-m68k/imagemagick_5.4.4.5-1woody6_m68k.deb stable/main/binary-m68k/perlmagick_5.4.4.5-1woody6_m68k.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody6_ia64.deb stable/main/binary-ia64/imagemagick_5.4.4.5-1woody6_ia64.deb stable/main/binary-ia64/perlmagick_5.4.4.5-1woody6_ia64.deb stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody6_ia64.deb stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody6_ia64.deb stable/main/binary-ia64/libmagick5_5.4.4.5-1woody6_ia64.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-i386/libmagick5_5.4.4.5-1woody6_i386.deb stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody6_i386.deb stable/main/binary-i386/imagemagick_5.4.4.5-1woody6_i386.deb stable/main/binary-i386/perlmagick_5.4.4.5-1woody6_i386.deb stable/main/binary-i386/libmagick++5_5.4.4.5-1woody6_i386.deb stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody6_i386.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody6_hppa.deb stable/main/binary-hppa/libmagick5_5.4.4.5-1woody6_hppa.deb stable/main/binary-hppa/imagemagick_5.4.4.5-1woody6_hppa.deb stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody6_hppa.deb stable/main/binary-hppa/perlmagick_5.4.4.5-1woody6_hppa.deb stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody6_hppa.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-alpha/perlmagick_5.4.4.5-1woody6_alpha.deb stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody6_alpha.deb stable/main/binary-alpha/imagemagick_5.4.4.5-1woody6_alpha.deb stable/main/binary-alpha/libmagick5_5.4.4.5-1woody6_alpha.deb stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody6_alpha.deb stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody6_alpha.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/source/imagemagick_5.4.4.5-1woody6.diff.gz stable/main/binary-arm/libmagick++5_5.4.4.5-1woody6_arm.deb stable/main/binary-arm/perlmagick_5.4.4.5-1woody6_arm.deb stable/main/binary-arm/imagemagick_5.4.4.5-1woody6_arm.deb stable/main/source/imagemagick_5.4.4.5-1woody6.dsc stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody6_arm.deb stable/main/binary-arm/libmagick5_5.4.4.5-1woody6_arm.deb stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody6_arm.deb imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backported patch by Tavis Ormandy to fix format string vulnerability [magick/image.c, CAN-2005-0397] * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759] * Applied patch to fix out of bounds memory access [coders/tiff.c, CAN-2005-0760] * Backported patch to fix heap buffer overflow [coders/sgi.c, CAN-2005-0762] stable/main/binary-sparc/hztty_2.0-5.2woody2_sparc.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-s390/hztty_2.0-5.2woody2_s390.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-powerpc/hztty_2.0-5.2woody2_powerpc.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-mips/hztty_2.0-5.2woody2_mips.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-m68k/hztty_2.0-5.2woody2_m68k.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-ia64/hztty_2.0-5.2woody2_ia64.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-i386/hztty_2.0-5.2woody2_i386.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-hppa/hztty_2.0-5.2woody2_hppa.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-arm/hztty_2.0-5.2woody2_arm.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-alpha/hztty_2.0-5.2woody2_alpha.deb hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/source/hztty_2.0-5.2woody2.dsc stable/main/binary-mipsel/hztty_2.0-5.2woody2_mipsel.deb stable/main/source/hztty_2.0-5.2woody2.diff.gz hztty (2.0-5.2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Drop setgid privileges before executing the user supplied shell command [main.c, CAN-2005-0019] stable/main/binary-sparc/hylafax-server_4.1.1-3.1_sparc.deb stable/main/binary-sparc/hylafax-client_4.1.1-3.1_sparc.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-s390/hylafax-client_4.1.1-3.1_s390.deb stable/main/binary-s390/hylafax-server_4.1.1-3.1_s390.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-powerpc/hylafax-client_4.1.1-3.1_powerpc.deb stable/main/binary-powerpc/hylafax-server_4.1.1-3.1_powerpc.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-m68k/hylafax-server_4.1.1-3.1_m68k.deb stable/main/binary-m68k/hylafax-client_4.1.1-3.1_m68k.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-ia64/hylafax-client_4.1.1-3.1_ia64.deb stable/main/binary-ia64/hylafax-server_4.1.1-3.1_ia64.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-hppa/hylafax-client_4.1.1-3.1_hppa.deb stable/main/binary-hppa/hylafax-server_4.1.1-3.1_hppa.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-arm/hylafax-server_4.1.1-3.1_arm.deb stable/main/binary-arm/hylafax-client_4.1.1-3.1_arm.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/binary-alpha/hylafax-server_4.1.1-3.1_alpha.deb stable/main/binary-alpha/hylafax-client_4.1.1-3.1_alpha.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/source/hylafax_4.1.1-3.1.diff.gz stable/main/binary-i386/hylafax-client_4.1.1-3.1_i386.deb stable/main/binary-all/hylafax-doc_4.1.1-3.1_all.deb stable/main/source/hylafax_4.1.1-3.1.dsc stable/main/binary-i386/hylafax-server_4.1.1-3.1_i386.deb hylafax (1:4.1.1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix unauthorised access vulnerability [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182] stable/main/source/htmlheadline_21.8-3.dsc stable/main/binary-all/htmlheadline_21.8-3_all.deb stable/main/source/htmlheadline_21.8-3.diff.gz htmlheadline (21.8-3) stable; urgency=high * Fix temporary file vulnerabilities by locating the temporary download directory in the user's homedir. [HtmlHeadLine.sh, START_HHL_30.sh, START_HHL.sh, CAN-2004-1181] stable/main/binary-sparc/htdig_3.1.6-3woody1_sparc.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-s390/htdig_3.1.6-3woody1_s390.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-powerpc/htdig_3.1.6-3woody1_powerpc.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-mips/htdig_3.1.6-3woody1_mips.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-m68k/htdig_3.1.6-3woody1_m68k.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-ia64/htdig_3.1.6-3woody1_ia64.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-i386/htdig_3.1.6-3woody1_i386.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-hppa/htdig_3.1.6-3woody1_hppa.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-arm/htdig_3.1.6-3woody1_arm.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-alpha/htdig_3.1.6-3woody1_alpha.deb htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/source/htdig_3.1.6-3woody1.dsc stable/main/binary-all/htdig-doc_3.1.6-3woody1_all.deb stable/main/binary-mipsel/htdig_3.1.6-3woody1_mipsel.deb stable/main/source/htdig_3.1.6-3woody1.diff.gz htdig (3.1.6-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Phil Knirsch to fix cross-site scripting vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc, htmerge/htmerge.cc, CAN-2005-0085] stable/main/binary-sparc/gopherd_3.0.3woody2_sparc.deb stable/main/binary-sparc/gopher_3.0.3woody2_sparc.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-s390/gopherd_3.0.3woody2_s390.deb stable/main/binary-s390/gopher_3.0.3woody2_s390.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-powerpc/gopherd_3.0.3woody2_powerpc.deb stable/main/binary-powerpc/gopher_3.0.3woody2_powerpc.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-mips/gopherd_3.0.3woody2_mips.deb stable/main/binary-mips/gopher_3.0.3woody2_mips.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-m68k/gopher_3.0.3woody2_m68k.deb stable/main/binary-m68k/gopherd_3.0.3woody2_m68k.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-ia64/gopher_3.0.3woody2_ia64.deb stable/main/binary-ia64/gopherd_3.0.3woody2_ia64.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-i386/gopher_3.0.3woody2_i386.deb stable/main/binary-i386/gopherd_3.0.3woody2_i386.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-hppa/gopherd_3.0.3woody2_hppa.deb stable/main/binary-hppa/gopher_3.0.3woody2_hppa.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-arm/gopher_3.0.3woody2_arm.deb stable/main/binary-arm/gopherd_3.0.3woody2_arm.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-alpha/gopher_3.0.3woody2_alpha.deb stable/main/binary-alpha/gopherd_3.0.3woody2_alpha.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-mipsel/gopher_3.0.3woody2_mipsel.deb stable/main/source/gopher_3.0.3woody2.dsc stable/main/source/gopher_3.0.3woody2.tar.gz stable/main/binary-mipsel/gopherd_3.0.3woody2_mipsel.deb gopher (3.0.3woody2) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560] * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561] * Sponsored by Martin Schulze . Thank you! stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6-dev_2.2.5-11.8_sparc.deb stable/main/binary-sparc/nscd_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6-prof_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6-dbg_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.2.5-11.8_sparc.deb stable/main/binary-sparc/libc6-pic_2.2.5-11.8_sparc.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-s390/libc6-dbg_2.2.5-11.8_s390.deb stable/main/binary-s390/libc6-pic_2.2.5-11.8_s390.deb stable/main/binary-s390/libc6-prof_2.2.5-11.8_s390.deb stable/main/binary-s390/libc6-dev_2.2.5-11.8_s390.deb stable/main/binary-s390/nscd_2.2.5-11.8_s390.deb stable/main/binary-s390/libc6_2.2.5-11.8_s390.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-powerpc/libc6-dev_2.2.5-11.8_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.2.5-11.8_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.2.5-11.8_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.2.5-11.8_powerpc.deb stable/main/binary-powerpc/libc6_2.2.5-11.8_powerpc.deb stable/main/binary-powerpc/nscd_2.2.5-11.8_powerpc.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-mipsel/libc6-dev_2.2.5-11.8_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.2.5-11.8_mipsel.deb stable/main/binary-mipsel/libc6_2.2.5-11.8_mipsel.deb stable/main/binary-mipsel/nscd_2.2.5-11.8_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.2.5-11.8_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.2.5-11.8_mipsel.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-mips/libc6-dev_2.2.5-11.8_mips.deb stable/main/binary-mips/libc6-pic_2.2.5-11.8_mips.deb stable/main/binary-mips/libc6-dbg_2.2.5-11.8_mips.deb stable/main/binary-mips/nscd_2.2.5-11.8_mips.deb stable/main/binary-mips/libc6_2.2.5-11.8_mips.deb stable/main/binary-mips/libc6-prof_2.2.5-11.8_mips.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-m68k/nscd_2.2.5-11.8_m68k.deb stable/main/binary-m68k/libc6-dev_2.2.5-11.8_m68k.deb stable/main/binary-m68k/libc6_2.2.5-11.8_m68k.deb stable/main/binary-m68k/libc6-pic_2.2.5-11.8_m68k.deb stable/main/binary-m68k/libc6-dbg_2.2.5-11.8_m68k.deb stable/main/binary-m68k/libc6-prof_2.2.5-11.8_m68k.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-ia64/libc6.1-dev_2.2.5-11.8_ia64.deb stable/main/binary-ia64/libc6.1_2.2.5-11.8_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.8_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.2.5-11.8_ia64.deb stable/main/binary-ia64/nscd_2.2.5-11.8_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.2.5-11.8_ia64.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-hppa/libc6_2.2.5-11.8_hppa.deb stable/main/binary-hppa/libc6-dev_2.2.5-11.8_hppa.deb stable/main/binary-hppa/libc6-prof_2.2.5-11.8_hppa.deb stable/main/binary-hppa/libc6-pic_2.2.5-11.8_hppa.deb stable/main/binary-hppa/libc6-dbg_2.2.5-11.8_hppa.deb stable/main/binary-hppa/nscd_2.2.5-11.8_hppa.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-arm/libc6-prof_2.2.5-11.8_arm.deb stable/main/binary-arm/libc6_2.2.5-11.8_arm.deb stable/main/binary-arm/libc6-dbg_2.2.5-11.8_arm.deb stable/main/binary-arm/nscd_2.2.5-11.8_arm.deb stable/main/binary-arm/libc6-pic_2.2.5-11.8_arm.deb stable/main/binary-arm/libc6-dev_2.2.5-11.8_arm.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-alpha/libc6.1-dev_2.2.5-11.8_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.2.5-11.8_alpha.deb stable/main/binary-alpha/nscd_2.2.5-11.8_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.8_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.2.5-11.8_alpha.deb stable/main/binary-alpha/libc6.1_2.2.5-11.8_alpha.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-i386/libc6-prof_2.2.5-11.8_i386.deb stable/main/binary-all/locales_2.2.5-11.8_all.deb stable/main/binary-i386/libc6_2.2.5-11.8_i386.deb stable/main/binary-i386/libc6-pic_2.2.5-11.8_i386.deb stable/main/binary-i386/libc6-dev_2.2.5-11.8_i386.deb stable/main/source/glibc_2.2.5-11.8.dsc stable/main/source/glibc_2.2.5-11.8.diff.gz stable/main/binary-all/glibc-doc_2.2.5-11.8_all.deb stable/main/binary-i386/nscd_2.2.5-11.8_i386.deb stable/main/binary-i386/libc6-dbg_2.2.5-11.8_i386.deb glibc (2.2.5-11.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968, debian/patches/CAN-2004-0968_tempfile.dpatch] * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the buildd tends to install the wrong package stable/main/binary-sparc/gftp-common_2.0.11-1woody1_sparc.deb stable/main/binary-sparc/gftp_2.0.11-1woody1_sparc.deb stable/main/binary-sparc/gftp-text_2.0.11-1woody1_sparc.deb stable/main/binary-sparc/gftp-gtk_2.0.11-1woody1_sparc.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-s390/gftp-common_2.0.11-1woody1_s390.deb stable/main/binary-s390/gftp-text_2.0.11-1woody1_s390.deb stable/main/binary-s390/gftp_2.0.11-1woody1_s390.deb stable/main/binary-s390/gftp-gtk_2.0.11-1woody1_s390.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-powerpc/gftp_2.0.11-1woody1_powerpc.deb stable/main/binary-powerpc/gftp-gtk_2.0.11-1woody1_powerpc.deb stable/main/binary-powerpc/gftp-text_2.0.11-1woody1_powerpc.deb stable/main/binary-powerpc/gftp-common_2.0.11-1woody1_powerpc.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-mips/gftp-gtk_2.0.11-1woody1_mips.deb stable/main/binary-mips/gftp_2.0.11-1woody1_mips.deb stable/main/binary-mips/gftp-text_2.0.11-1woody1_mips.deb stable/main/binary-mips/gftp-common_2.0.11-1woody1_mips.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-m68k/gftp-gtk_2.0.11-1woody1_m68k.deb stable/main/binary-m68k/gftp-common_2.0.11-1woody1_m68k.deb stable/main/binary-m68k/gftp-text_2.0.11-1woody1_m68k.deb stable/main/binary-m68k/gftp_2.0.11-1woody1_m68k.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-ia64/gftp-gtk_2.0.11-1woody1_ia64.deb stable/main/binary-ia64/gftp_2.0.11-1woody1_ia64.deb stable/main/binary-ia64/gftp-text_2.0.11-1woody1_ia64.deb stable/main/binary-ia64/gftp-common_2.0.11-1woody1_ia64.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-i386/gftp-common_2.0.11-1woody1_i386.deb stable/main/binary-i386/gftp_2.0.11-1woody1_i386.deb stable/main/binary-i386/gftp-text_2.0.11-1woody1_i386.deb stable/main/binary-i386/gftp-gtk_2.0.11-1woody1_i386.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-hppa/gftp_2.0.11-1woody1_hppa.deb stable/main/binary-hppa/gftp-common_2.0.11-1woody1_hppa.deb stable/main/binary-hppa/gftp-gtk_2.0.11-1woody1_hppa.deb stable/main/binary-hppa/gftp-text_2.0.11-1woody1_hppa.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-arm/gftp-gtk_2.0.11-1woody1_arm.deb stable/main/binary-arm/gftp-text_2.0.11-1woody1_arm.deb stable/main/binary-arm/gftp_2.0.11-1woody1_arm.deb stable/main/binary-arm/gftp-common_2.0.11-1woody1_arm.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-alpha/gftp-common_2.0.11-1woody1_alpha.deb stable/main/binary-alpha/gftp-text_2.0.11-1woody1_alpha.deb stable/main/binary-alpha/gftp_2.0.11-1woody1_alpha.deb stable/main/binary-alpha/gftp-gtk_2.0.11-1woody1_alpha.deb gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-mipsel/gftp-common_2.0.11-1woody1_mipsel.deb stable/main/binary-mipsel/gftp-text_2.0.11-1woody1_mipsel.deb stable/main/binary-mipsel/gftp_2.0.11-1woody1_mipsel.deb stable/main/source/gftp_2.0.11-1woody1.dsc stable/main/binary-mipsel/gftp-gtk_2.0.11-1woody1_mipsel.deb stable/main/source/gftp_2.0.11-1woody1.diff.gz gftp (2.0.11-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix a directory traversal [lib/protocols.c, CAN-2005-0372] stable/main/binary-sparc/gobjc-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libstdc++2.10-dev_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/g++-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/chill-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/cpp-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libstdc++2.10-glibc2.2_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/gpc-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/g77-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libg++2.8.1.3-dbg_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/gcc-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libg++2.8.1.3-dev_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/protoize-2.95_2.95.4-11woody1_sparc.deb stable/main/binary-sparc/libstdc++2.10-dbg_2.95.4-11woody1_sparc.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-mipsel/g77-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/protoize-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libstdc++2.10-glibc2.2_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/chill-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/gobjc-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libstdc++2.10-dbg_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/cpp-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/gpc-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/gcc-2.95_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libg++2.8.1.3-dev_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libstdc++2.10-dev_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/libg++2.8.1.3-dbg_2.95.4-11woody1_mipsel.deb stable/main/binary-mipsel/g++-2.95_2.95.4-11woody1_mipsel.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-mips/cpp-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/libstdc++2.10-dev_2.95.4-11woody1_mips.deb stable/main/binary-mips/chill-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/gcc-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/protoize-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/libstdc++2.10-dbg_2.95.4-11woody1_mips.deb stable/main/binary-mips/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_mips.deb stable/main/binary-mips/gobjc-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/libstdc++2.10-glibc2.2_2.95.4-11woody1_mips.deb stable/main/binary-mips/gpc-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/g77-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/libg++2.8.1.3-dev_2.95.4-11woody1_mips.deb stable/main/binary-mips/g++-2.95_2.95.4-11woody1_mips.deb stable/main/binary-mips/libg++2.8.1.3-dbg_2.95.4-11woody1_mips.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/source/gatos_0.0.5-6woody3.dsc stable/main/source/gatos_0.0.5-6woody3.diff.gz stable/main/binary-i386/gatos_0.0.5-6woody3_i386.deb stable/main/binary-i386/libgatos0_0.0.5-6woody3_i386.deb stable/main/binary-i386/libgatos-dev_0.0.5-6woody3_i386.deb gatos (0.0.5-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected size calculation to fix a buffer overflow [src/xutils.c, CAN-2005-0016] stable/main/source/gallery_1.2.5-8woody3.dsc stable/main/binary-all/gallery_1.2.5-8woody3_all.deb stable/main/source/gallery_1.2.5-8woody3.diff.gz gallery (1.2.5-8woody3) stable-security; urgency=high * Non-maintainer upload for the Security Team * Fix cross-site scripting vulnerability in include parameter [index.php, CAN-2004-1106] * Added dbhost and GLOBALS to sensitive list [init.php, CAN] * Check for imported variables via $_REQUEST and $_FILES as well [init.php, CVE-NOMATCH] stable/main/binary-sparc/f2c_20010821-3.1_sparc.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-s390/f2c_20010821-3.1_s390.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-powerpc/f2c_20010821-3.1_powerpc.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-mips/f2c_20010821-3.1_mips.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-m68k/f2c_20010821-3.1_m68k.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-ia64/f2c_20010821-3.1_ia64.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-i386/f2c_20010821-3.1_i386.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-hppa/f2c_20010821-3.1_hppa.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-arm/f2c_20010821-3.1_arm.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-alpha/f2c_20010821-3.1_alpha.deb f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/source/f2c_20010821-3.1.diff.gz stable/main/binary-mipsel/f2c_20010821-3.1_mipsel.deb stable/main/source/f2c_20010821-3.1.dsc f2c (20010821-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Hacked debian/rules so that additional patches can be applied, since the package itself does check whether it's using the pristine source * Corrected creating of temporary files f2c [src/sysdep.c, patches/patch.CAN-2005-0017.f2c, CAN-2005-0017] * Added patch by Javier Fernández-Sanguino Peña to fix temporary file problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018] * Surgically removed xsum comparison since it prevents security updates from being applied [src/makefile] stable/main/binary-sparc/exim_3.35-1woody4_sparc.deb stable/main/binary-sparc/eximon_3.35-1woody4_sparc.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-s390/eximon_3.35-1woody4_s390.deb stable/main/binary-s390/exim_3.35-1woody4_s390.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-powerpc/exim_3.35-1woody4_powerpc.deb stable/main/binary-powerpc/eximon_3.35-1woody4_powerpc.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-mips/eximon_3.35-1woody4_mips.deb stable/main/binary-mips/exim_3.35-1woody4_mips.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-m68k/exim_3.35-1woody4_m68k.deb stable/main/binary-m68k/eximon_3.35-1woody4_m68k.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-ia64/exim_3.35-1woody4_ia64.deb stable/main/binary-ia64/eximon_3.35-1woody4_ia64.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-i386/exim_3.35-1woody4_i386.deb stable/main/binary-i386/eximon_3.35-1woody4_i386.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-hppa/eximon_3.35-1woody4_hppa.deb stable/main/binary-hppa/exim_3.35-1woody4_hppa.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-arm/eximon_3.35-1woody4_arm.deb stable/main/binary-arm/exim_3.35-1woody4_arm.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-alpha/eximon_3.35-1woody4_alpha.deb stable/main/binary-alpha/exim_3.35-1woody4_alpha.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/source/exim_3.35-1woody4.diff.gz stable/main/source/exim_3.35-1woody4.dsc stable/main/binary-mipsel/exim_3.35-1woody4_mipsel.deb stable/main/binary-mipsel/eximon_3.35-1woody4_mipsel.deb exim (3.35-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a buffer overflow in the IPv6 address handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021] stable/main/binary-sparc/libcamel-dev_1.0.5-1woody2_sparc.deb stable/main/binary-sparc/evolution_1.0.5-1woody2_sparc.deb stable/main/binary-sparc/libcamel0_1.0.5-1woody2_sparc.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-s390/evolution_1.0.5-1woody2_s390.deb stable/main/binary-s390/libcamel0_1.0.5-1woody2_s390.deb stable/main/binary-s390/libcamel-dev_1.0.5-1woody2_s390.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-powerpc/evolution_1.0.5-1woody2_powerpc.deb stable/main/binary-powerpc/libcamel-dev_1.0.5-1woody2_powerpc.deb stable/main/binary-powerpc/libcamel0_1.0.5-1woody2_powerpc.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-m68k/evolution_1.0.5-1woody2_m68k.deb stable/main/binary-m68k/libcamel-dev_1.0.5-1woody2_m68k.deb stable/main/binary-m68k/libcamel0_1.0.5-1woody2_m68k.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-i386/libcamel-dev_1.0.5-1woody2_i386.deb stable/main/binary-i386/libcamel0_1.0.5-1woody2_i386.deb stable/main/binary-i386/evolution_1.0.5-1woody2_i386.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-arm/libcamel0_1.0.5-1woody2_arm.deb stable/main/binary-arm/evolution_1.0.5-1woody2_arm.deb stable/main/binary-arm/libcamel-dev_1.0.5-1woody2_arm.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-alpha/evolution_1.0.5-1woody2_alpha.deb stable/main/binary-alpha/libcamel-dev_1.0.5-1woody2_alpha.deb stable/main/binary-alpha/libcamel0_1.0.5-1woody2_alpha.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-ia64/libcamel0_1.0.5-1woody2_ia64.deb stable/main/source/evolution_1.0.5-1woody2.dsc stable/main/binary-ia64/evolution_1.0.5-1woody2_ia64.deb stable/main/source/evolution_1.0.5-1woody2.diff.gz stable/main/binary-ia64/libcamel-dev_1.0.5-1woody2_ia64.deb evolution (1.0.5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix integer overflow [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102] * Non-changes buildd so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-sparc/ethereal_0.9.4-1woody11_sparc.deb stable/main/binary-sparc/ethereal-dev_0.9.4-1woody11_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody11_sparc.deb stable/main/binary-sparc/tethereal_0.9.4-1woody11_sparc.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-s390/ethereal_0.9.4-1woody11_s390.deb stable/main/binary-s390/ethereal-common_0.9.4-1woody11_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody11_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody11_s390.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-powerpc/ethereal_0.9.4-1woody11_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody11_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody11_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody11_powerpc.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-mipsel/ethereal-common_0.9.4-1woody11_mipsel.deb stable/main/binary-mipsel/tethereal_0.9.4-1woody11_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody11_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody11_mipsel.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-mips/ethereal_0.9.4-1woody11_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody11_mips.deb stable/main/binary-mips/ethereal-dev_0.9.4-1woody11_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody11_mips.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-m68k/ethereal_0.9.4-1woody11_m68k.deb stable/main/binary-m68k/ethereal-dev_0.9.4-1woody11_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody11_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody11_m68k.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-ia64/ethereal-common_0.9.4-1woody11_ia64.deb stable/main/binary-ia64/tethereal_0.9.4-1woody11_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody11_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody11_ia64.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-hppa/ethereal_0.9.4-1woody11_hppa.deb stable/main/binary-hppa/ethereal-common_0.9.4-1woody11_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody11_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody11_hppa.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-arm/ethereal-common_0.9.4-1woody11_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody11_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody11_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody11_arm.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-alpha/ethereal-dev_0.9.4-1woody11_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody11_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody11_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody11_alpha.deb ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-i386/ethereal-common_0.9.4-1woody11_i386.deb stable/main/binary-i386/ethereal_0.9.4-1woody11_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody11_i386.deb stable/main/binary-i386/tethereal_0.9.4-1woody11_i386.deb stable/main/source/ethereal_0.9.4-1woody11.diff.gz stable/main/source/ethereal_0.9.4-1woody11.dsc ethereal (0.9.4-1woody11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the backported patch to fix buffer overflow in X11 dissector [packet-x11.c, CAN-2005-0084] stable/main/binary-sparc/enscript_1.6.3-1.3_sparc.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-s390/enscript_1.6.3-1.3_s390.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-powerpc/enscript_1.6.3-1.3_powerpc.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-mips/enscript_1.6.3-1.3_mips.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-m68k/enscript_1.6.3-1.3_m68k.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-ia64/enscript_1.6.3-1.3_ia64.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-i386/enscript_1.6.3-1.3_i386.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-hppa/enscript_1.6.3-1.3_hppa.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-arm/enscript_1.6.3-1.3_arm.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-alpha/enscript_1.6.3-1.3_alpha.deb enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-mipsel/enscript_1.6.3-1.3_mipsel.deb stable/main/source/enscript_1.6.3-1.3.diff.gz stable/main/source/enscript_1.6.3-1.3.dsc enscript (1.6.3-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186] stable/main/binary-sparc/emacs21_21.2-1woody3_sparc.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-s390/emacs21_21.2-1woody3_s390.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-powerpc/emacs21_21.2-1woody3_powerpc.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-mipsel/emacs21_21.2-1woody3_mipsel.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-mips/emacs21_21.2-1woody3_mips.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-m68k/emacs21_21.2-1woody3_m68k.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-i386/emacs21_21.2-1woody3_i386.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-hppa/emacs21_21.2-1woody3_hppa.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-arm/emacs21_21.2-1woody3_arm.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-alpha/emacs21_21.2-1woody3_alpha.deb emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/source/emacs21_21.2-1woody3.dsc stable/main/binary-all/emacs21-el_21.2-1woody3_all.deb stable/main/binary-ia64/emacs21_21.2-1woody3_ia64.deb stable/main/source/emacs21_21.2-1woody3.diff.gz emacs21 (21.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100] stable/main/binary-sparc/emacs20_20.7-13.3_sparc.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-s390/emacs20_20.7-13.3_s390.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-powerpc/emacs20_20.7-13.3_powerpc.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-mipsel/emacs20_20.7-13.3_mipsel.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-mips/emacs20_20.7-13.3_mips.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-m68k/emacs20_20.7-13.3_m68k.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-i386/emacs20_20.7-13.3_i386.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-hppa/emacs20_20.7-13.3_hppa.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-arm/emacs20_20.7-13.3_arm.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-alpha/emacs20_20.7-13.3_alpha.deb emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/source/emacs20_20.7-13.3.diff.gz stable/main/binary-all/emacs20-el_20.7-13.3_all.deb stable/main/binary-ia64/emacs20_20.7-13.3_ia64.deb stable/main/source/emacs20_20.7-13.3.dsc emacs20 (20.7-13.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Max Vozeler to fix format string vulnerabilities [lib-src/movemail.c, CAN-2005-0100] * Non-changes build so that the i386 buildd can pick up the package again so that the build might eventually end up in the archive stable/main/binary-sparc/cupsys-bsd_1.1.14-5woody12_sparc.deb stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5woody12_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.1.14-5woody12_sparc.deb stable/main/binary-sparc/libcupsys2_1.1.14-5woody12_sparc.deb stable/main/binary-sparc/cupsys_1.1.14-5woody12_sparc.deb stable/main/binary-sparc/cupsys-client_1.1.14-5woody12_sparc.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-s390/libcupsys2_1.1.14-5woody12_s390.deb stable/main/binary-s390/cupsys-pstoraster_1.1.14-5woody12_s390.deb stable/main/binary-s390/cupsys_1.1.14-5woody12_s390.deb stable/main/binary-s390/libcupsys2-dev_1.1.14-5woody12_s390.deb stable/main/binary-s390/cupsys-bsd_1.1.14-5woody12_s390.deb stable/main/binary-s390/cupsys-client_1.1.14-5woody12_s390.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5woody12_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.1.14-5woody12_powerpc.deb stable/main/binary-powerpc/libcupsys2_1.1.14-5woody12_powerpc.deb stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5woody12_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.1.14-5woody12_powerpc.deb stable/main/binary-powerpc/cupsys_1.1.14-5woody12_powerpc.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-mips/libcupsys2-dev_1.1.14-5woody12_mips.deb stable/main/binary-mips/libcupsys2_1.1.14-5woody12_mips.deb stable/main/binary-mips/cupsys-client_1.1.14-5woody12_mips.deb stable/main/binary-mips/cupsys_1.1.14-5woody12_mips.deb stable/main/binary-mips/cupsys-bsd_1.1.14-5woody12_mips.deb stable/main/binary-mips/cupsys-pstoraster_1.1.14-5woody12_mips.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-m68k/libcupsys2-dev_1.1.14-5woody12_m68k.deb stable/main/binary-m68k/cupsys-bsd_1.1.14-5woody12_m68k.deb stable/main/binary-m68k/libcupsys2_1.1.14-5woody12_m68k.deb stable/main/binary-m68k/cupsys-client_1.1.14-5woody12_m68k.deb stable/main/binary-m68k/cupsys_1.1.14-5woody12_m68k.deb stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5woody12_m68k.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5woody12_ia64.deb stable/main/binary-ia64/cupsys-client_1.1.14-5woody12_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.1.14-5woody12_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.1.14-5woody12_ia64.deb stable/main/binary-ia64/cupsys_1.1.14-5woody12_ia64.deb stable/main/binary-ia64/libcupsys2_1.1.14-5woody12_ia64.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-i386/libcupsys2_1.1.14-5woody12_i386.deb stable/main/binary-i386/libcupsys2-dev_1.1.14-5woody12_i386.deb stable/main/binary-i386/cupsys_1.1.14-5woody12_i386.deb stable/main/binary-i386/cupsys-client_1.1.14-5woody12_i386.deb stable/main/binary-i386/cupsys-pstoraster_1.1.14-5woody12_i386.deb stable/main/binary-i386/cupsys-bsd_1.1.14-5woody12_i386.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5woody12_hppa.deb stable/main/binary-hppa/libcupsys2_1.1.14-5woody12_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.1.14-5woody12_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.1.14-5woody12_hppa.deb stable/main/binary-hppa/cupsys_1.1.14-5woody12_hppa.deb stable/main/binary-hppa/cupsys-client_1.1.14-5woody12_hppa.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-arm/cupsys-client_1.1.14-5woody12_arm.deb stable/main/binary-arm/cupsys_1.1.14-5woody12_arm.deb stable/main/binary-arm/libcupsys2_1.1.14-5woody12_arm.deb stable/main/binary-arm/cupsys-pstoraster_1.1.14-5woody12_arm.deb stable/main/binary-arm/libcupsys2-dev_1.1.14-5woody12_arm.deb stable/main/binary-arm/cupsys-bsd_1.1.14-5woody12_arm.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-alpha/cupsys_1.1.14-5woody12_alpha.deb stable/main/binary-alpha/libcupsys2_1.1.14-5woody12_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.1.14-5woody12_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.1.14-5woody12_alpha.deb stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5woody12_alpha.deb stable/main/binary-alpha/cupsys-client_1.1.14-5woody12_alpha.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-mipsel/cupsys_1.1.14-5woody12_mipsel.deb stable/main/source/cupsys_1.1.14-5woody12.dsc stable/main/binary-mipsel/cupsys-client_1.1.14-5woody12_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.1.14-5woody12_mipsel.deb stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5woody12_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.1.14-5woody12_mipsel.deb stable/main/source/cupsys_1.1.14-5woody12.diff.gz stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5woody12_mipsel.deb cupsys (1.1.14-5woody12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow that could overwrite the stack and hence cause the execution of arbitrary code as reported by iDEFENSE [pdftops/Decrypt.cxx, CAN-2005-0064] stable/main/binary-sparc/cpio_2.4.2-39woody1_sparc.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-s390/cpio_2.4.2-39woody1_s390.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-powerpc/cpio_2.4.2-39woody1_powerpc.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-mips/cpio_2.4.2-39woody1_mips.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-m68k/cpio_2.4.2-39woody1_m68k.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-ia64/cpio_2.4.2-39woody1_ia64.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-i386/cpio_2.4.2-39woody1_i386.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-hppa/cpio_2.4.2-39woody1_hppa.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-arm/cpio_2.4.2-39woody1_arm.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-alpha/cpio_2.4.2-39woody1_alpha.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/source/cpio_2.4.2-39woody1.diff.gz stable/main/source/cpio_2.4.2-39woody1.dsc stable/main/binary-mipsel/cpio_2.4.2-39woody1_mipsel.deb cpio (2.4.2-39woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from Albert Chin-A-Young to fix broken permissions on output file with -O/-F [main.c, CAN-1999-1572, http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec] stable/main/binary-sparc/chbg_1.5-1woody1_sparc.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-s390/chbg_1.5-1woody1_s390.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-powerpc/chbg_1.5-1woody1_powerpc.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-mipsel/chbg_1.5-1woody1_mipsel.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-mips/chbg_1.5-1woody1_mips.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-m68k/chbg_1.5-1woody1_m68k.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-ia64/chbg_1.5-1woody1_ia64.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-arm/chbg_1.5-1woody1_arm.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-alpha/chbg_1.5-1woody1_alpha.deb chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-i386/chbg_1.5-1woody1_i386.deb stable/main/source/chbg_1.5-1woody1.diff.gz stable/main/source/chbg_1.5-1woody1.dsc chbg (1.5-1woody1) stable-security; urgency=high * Non maintainer upload by The Security Team * Fix buffer overflow when reading scenario files. [config.c, CAN-2004-1264] stable/main/binary-all/cacti_0.6.7-2.2_all.deb stable/main/source/cacti_0.6.7-2.2.diff.gz stable/main/source/cacti_0.6.7-2.2.dsc cacti (0.6.7-2.2) stable-security; urgency=medium * Non-maintainer upload by Stable Release Manager * Bumped version number and rebuilt so that the package can make it into stable (DSA 164) stable/main/binary-sparc/bsmtpd_2.3pl8b-12woody1_sparc.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-s390/bsmtpd_2.3pl8b-12woody1_s390.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-powerpc/bsmtpd_2.3pl8b-12woody1_powerpc.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-mips/bsmtpd_2.3pl8b-12woody1_mips.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-m68k/bsmtpd_2.3pl8b-12woody1_m68k.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-ia64/bsmtpd_2.3pl8b-12woody1_ia64.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-i386/bsmtpd_2.3pl8b-12woody1_i386.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-hppa/bsmtpd_2.3pl8b-12woody1_hppa.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-arm/bsmtpd_2.3pl8b-12woody1_arm.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-alpha/bsmtpd_2.3pl8b-12woody1_alpha.deb bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/binary-mipsel/bsmtpd_2.3pl8b-12woody1_mipsel.deb stable/main/source/bsmtpd_2.3pl8b-12woody1.dsc stable/main/source/bsmtpd_2.3pl8b-12woody1.diff.gz bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Bastian Blank to properly sanitise addresses before they are used as commandline arguments [bsmtpd.c, CAN-2005-0107] stable/main/source/bmv_1.2-14.2.dsc stable/main/source/bmv_1.2-14.2.diff.gz stable/main/binary-i386/bmv_1.2-14.2_i386.deb bmv (1.2-14.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted upstream patch from Peter Samuelson [gsinterf.c] * Applied patch from Guillem Jover to fix insecure temporary file use [gsinterf.c, CAN-2003-0014] stable/main/binary-sparc/bidwatcher_1.3.3-1woody1_sparc.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-s390/bidwatcher_1.3.3-1woody1_s390.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-powerpc/bidwatcher_1.3.3-1woody1_powerpc.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-mips/bidwatcher_1.3.3-1woody1_mips.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-m68k/bidwatcher_1.3.3-1woody1_m68k.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-ia64/bidwatcher_1.3.3-1woody1_ia64.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-i386/bidwatcher_1.3.3-1woody1_i386.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-hppa/bidwatcher_1.3.3-1woody1_hppa.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-arm/bidwatcher_1.3.3-1woody1_arm.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-alpha/bidwatcher_1.3.3-1woody1_alpha.deb bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/source/bidwatcher_1.3.3-1woody1.dsc stable/main/binary-mipsel/bidwatcher_1.3.3-1woody1_mipsel.deb stable/main/source/bidwatcher_1.3.3-1woody1.diff.gz bidwatcher (1.3.3-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Ulf Haernhammar to fix format string vulnerability [netstuff.cpp, CAN-2005-0158] stable/main/binary-sparc/axel_1.0a-1woody1_sparc.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-s390/axel_1.0a-1woody1_s390.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-powerpc/axel_1.0a-1woody1_powerpc.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-mipsel/axel_1.0a-1woody1_mipsel.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-mips/axel_1.0a-1woody1_mips.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-m68k/axel_1.0a-1woody1_m68k.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-ia64/axel_1.0a-1woody1_ia64.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-i386/axel_1.0a-1woody1_i386.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-hppa/axel_1.0a-1woody1_hppa.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-alpha/axel_1.0a-1woody1_alpha.deb axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/binary-arm/axel_1.0a-1woody1_arm.deb stable/main/source/axel_1.0a-1woody1.diff.gz stable/main/binary-all/axel-kapt_1.0a-1woody1_all.deb stable/main/source/axel_1.0a-1woody1.dsc axel (1.0a-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer overflow [conn.c, CAN-2005-0390] stable/main/source/awstats_4.0-0.woody.2.dsc stable/main/source/awstats_4.0-0.woody.2.diff.gz stable/main/binary-all/awstats_4.0-0.woody.2_all.deb awstats (4.0-0.woody.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Martin Pitt to fix a cross-site scripting vulnerability [wwwroot/cgi-bin/awstats.pl, CAN-2005-0363] stable/main/binary-sparc/abuse_2.00+-3woody4_sparc.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-s390/abuse_2.00+-3woody4_s390.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-powerpc/abuse_2.00+-3woody4_powerpc.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-mipsel/abuse_2.00+-3woody4_mipsel.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-mips/abuse_2.00+-3woody4_mips.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-m68k/abuse_2.00+-3woody4_m68k.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-ia64/abuse_2.00+-3woody4_ia64.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-hppa/abuse_2.00+-3woody4_hppa.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-arm/abuse_2.00+-3woody4_arm.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-alpha/abuse_2.00+-3woody4_alpha.deb abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/source/abuse_2.00+-3woody4.diff.gz stable/main/binary-i386/abuse_2.00+-3woody4_i386.deb stable/main/source/abuse_2.00+-3woody4.dsc abuse (2.00+-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges after dropping them in the fix for unsafe file creation [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099] stable/main/binary-sparc/php3_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-xml_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-dev_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-imap_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-magick_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody3_sparc.deb stable/main/binary-sparc/php3-gd_3.0.18-23.1woody3_sparc.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-ldap_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-mysql_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-magick_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-snmp_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-imap_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-gd_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-dev_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-mhash_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3_3.0.18-23.1woody3_s390.deb stable/main/binary-s390/php3-xml_3.0.18-23.1woody3_s390.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody3_powerpc.deb stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody3_powerpc.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody3_mipsel.deb stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody3_mipsel.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-mips/php3-imap_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-magick_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-dev_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-gd_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-ldap_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-xml_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-mysql_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-mhash_3.0.18-23.1woody3_mips.deb stable/main/binary-mips/php3-snmp_3.0.18-23.1woody3_mips.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-m68k/php3-dev_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-xml_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-imap_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-gd_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-magick_3.0.18-23.1woody3_m68k.deb stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody3_m68k.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-gd_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-imap_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-dev_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-xml_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-magick_3.0.18-23.1woody3_ia64.deb stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody3_ia64.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-gd_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-xml_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-imap_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-snmp_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-magick_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-ldap_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-mhash_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-mysql_3.0.18-23.1woody3_i386.deb stable/main/binary-i386/php3-dev_3.0.18-23.1woody3_i386.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-dev_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-magick_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-xml_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-gd_3.0.18-23.1woody3_hppa.deb stable/main/binary-hppa/php3-imap_3.0.18-23.1woody3_hppa.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-alpha/php3_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-xml_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-imap_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-gd_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-magick_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody3_alpha.deb stable/main/binary-alpha/php3-dev_3.0.18-23.1woody3_alpha.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-mhash_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-magick_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-snmp_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody3_arm.deb stable/main/source/php3_3.0.18-23.1woody3.diff.gz stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-imap_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-gd_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-ldap_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-dev_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-xml_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody3_arm.deb stable/main/source/php3_3.0.18-23.1woody3.dsc stable/main/binary-arm/php3-mysql_3.0.18-23.1woody3_arm.deb stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody3_arm.deb stable/main/binary-all/php3-doc_3.0.18-23.1woody3_all.deb php3 (3:3.0.18-23.1woody3) stable-security; urgency=high * Backport fixes to functions/image.c from the 4.3 branch: - Avoid infinite loops in the php3_skip_variable() function and the php3_read_APP() function which were being called indirectly by getimagesize() function. As this function is commonly called with untrusted data, this becomes a remote DoS. [functions/image.c] - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable to CAN-2005-0524, the sister bug to this one) ========================================= Fri, 31 Dec 2004 - Debian 3.0r4 released ========================================= stable/main/source/zgv_5.5-3woody2.dsc stable/main/binary-i386/zgv_5.5-3woody2_i386.deb stable/main/source/zgv_5.5-3woody2.diff.gz zgv (5.5-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team to fix the CVE reference stable/main/binary-sparc/yardradius_1.0.20-2woody1_sparc.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-s390/yardradius_1.0.20-2woody1_s390.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-powerpc/yardradius_1.0.20-2woody1_powerpc.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-mips/yardradius_1.0.20-2woody1_mips.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-m68k/yardradius_1.0.20-2woody1_m68k.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-ia64/yardradius_1.0.20-2woody1_ia64.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-i386/yardradius_1.0.20-2woody1_i386.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-hppa/yardradius_1.0.20-2woody1_hppa.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-arm/yardradius_1.0.20-2woody1_arm.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-alpha/yardradius_1.0.20-2woody1_alpha.deb yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/source/yardradius_1.0.20-2woody1.diff.gz stable/main/binary-mipsel/yardradius_1.0.20-2woody1_mipsel.deb stable/main/source/yardradius_1.0.20-2woody1.dsc yardradius (1.0.20-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384] stable/main/binary-sparc/xzgv_0.7-6woody2_sparc.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-s390/xzgv_0.7-6woody2_s390.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-powerpc/xzgv_0.7-6woody2_powerpc.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-mips/xzgv_0.7-6woody2_mips.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-m68k/xzgv_0.7-6woody2_m68k.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-ia64/xzgv_0.7-6woody2_ia64.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-i386/xzgv_0.7-6woody2_i386.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-hppa/xzgv_0.7-6woody2_hppa.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-arm/xzgv_0.7-6woody2_arm.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-alpha/xzgv_0.7-6woody2_alpha.deb xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-mipsel/xzgv_0.7-6woody2_mipsel.deb stable/main/source/xzgv_0.7-6woody2.dsc stable/main/source/xzgv_0.7-6woody2.diff.gz xzgv (0.7-6woody2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added another integer overflow protection, discovered by Ludwig Nussel [src/readpng.c, CAN-2004-0994] stable/main/binary-sparc/xpdf-reader_1.00-3.2_sparc.deb stable/main/binary-sparc/xpdf-utils_1.00-3.2_sparc.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-s390/xpdf-utils_1.00-3.2_s390.deb stable/main/binary-s390/xpdf-reader_1.00-3.2_s390.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-powerpc/xpdf-reader_1.00-3.2_powerpc.deb stable/main/binary-powerpc/xpdf-utils_1.00-3.2_powerpc.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-mips/xpdf-utils_1.00-3.2_mips.deb stable/main/binary-mips/xpdf-reader_1.00-3.2_mips.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-m68k/xpdf-reader_1.00-3.2_m68k.deb stable/main/binary-m68k/xpdf-utils_1.00-3.2_m68k.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-ia64/xpdf-reader_1.00-3.2_ia64.deb stable/main/binary-ia64/xpdf-utils_1.00-3.2_ia64.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-i386/xpdf-reader_1.00-3.2_i386.deb stable/main/binary-i386/xpdf-utils_1.00-3.2_i386.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-hppa/xpdf-utils_1.00-3.2_hppa.deb stable/main/binary-hppa/xpdf-reader_1.00-3.2_hppa.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-arm/xpdf-utils_1.00-3.2_arm.deb stable/main/binary-arm/xpdf-reader_1.00-3.2_arm.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-alpha/xpdf-utils_1.00-3.2_alpha.deb stable/main/binary-alpha/xpdf-reader_1.00-3.2_alpha.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-all/xpdf-common_1.00-3.2_all.deb stable/main/binary-all/xpdf_1.00-3.2_all.deb stable/main/source/xpdf_1.00-3.2.dsc stable/main/source/xpdf_1.00-3.2.diff.gz stable/main/binary-mipsel/xpdf-utils_1.00-3.2_mipsel.deb stable/main/binary-mipsel/xpdf-reader_1.00-3.2_mipsel.deb xpdf (1.00-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied modified patch by Sebastian Krahmer to fix several integer overflows discovered by Chris Evans (thanks to Frank Kuester) [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888] stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libxaw7_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libxaw6_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibs_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/twm_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xprt_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/proxymngr_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibs-pic_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xdm_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xserver-common_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibmesa3_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xterm_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/lbxproxy_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/x-window-system-core_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xfs_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xnest_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xutils_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xbase-clients_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libdps-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/libdps1_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xlibs-dev_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xvfb_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xmh_4.1.0-16woody5_sparc.deb stable/main/binary-sparc/xfwp_4.1.0-16woody5_sparc.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-s390/lbxproxy_4.1.0-16woody5_s390.deb stable/main/binary-s390/xutils_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibs-pic_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibs_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw7-dev_4.1.0-16woody5_s390.deb stable/main/binary-s390/xterm_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody5_s390.deb stable/main/binary-s390/libdps1_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody5_s390.deb stable/main/binary-s390/xvfb_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw6-dev_4.1.0-16woody5_s390.deb stable/main/binary-s390/libdps1-dbg_4.1.0-16woody5_s390.deb stable/main/binary-s390/xprt_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw7_4.1.0-16woody5_s390.deb stable/main/binary-s390/libdps-dev_4.1.0-16woody5_s390.deb stable/main/binary-s390/twm_4.1.0-16woody5_s390.deb stable/main/binary-s390/xbase-clients_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibs-dev_4.1.0-16woody5_s390.deb stable/main/binary-s390/proxymngr_4.1.0-16woody5_s390.deb stable/main/binary-s390/xdm_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibs-dbg_4.1.0-16woody5_s390.deb stable/main/binary-s390/xserver-common_4.1.0-16woody5_s390.deb stable/main/binary-s390/xmh_4.1.0-16woody5_s390.deb stable/main/binary-s390/x-window-system-core_4.1.0-16woody5_s390.deb stable/main/binary-s390/libxaw6_4.1.0-16woody5_s390.deb stable/main/binary-s390/xfwp_4.1.0-16woody5_s390.deb stable/main/binary-s390/xlibmesa3_4.1.0-16woody5_s390.deb stable/main/binary-s390/xfs_4.1.0-16woody5_s390.deb stable/main/binary-s390/xnest_4.1.0-16woody5_s390.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xutils_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xmh_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/twm_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xbase-clients_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xterm_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xnest_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xdm_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xprt_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xfs_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibs_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xfwp_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libxaw6_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xvfb_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xserver-common_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libxaw7_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/proxymngr_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/libdps1_4.1.0-16woody5_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody5_mipsel.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-mips/libxaw7_4.1.0-16woody5_mips.deb stable/main/binary-mips/xfs_4.1.0-16woody5_mips.deb stable/main/binary-mips/libxaw7-dev_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibs-pic_4.1.0-16woody5_mips.deb stable/main/binary-mips/twm_4.1.0-16woody5_mips.deb stable/main/binary-mips/libdps1_4.1.0-16woody5_mips.deb stable/main/binary-mips/xnest_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody5_mips.deb stable/main/binary-mips/libxaw6_4.1.0-16woody5_mips.deb stable/main/binary-mips/xfwp_4.1.0-16woody5_mips.deb stable/main/binary-mips/xvfb_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibs-dev_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibmesa3_4.1.0-16woody5_mips.deb stable/main/binary-mips/libxaw6-dev_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibs_4.1.0-16woody5_mips.deb stable/main/binary-mips/libdps-dev_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibs-dbg_4.1.0-16woody5_mips.deb stable/main/binary-mips/proxymngr_4.1.0-16woody5_mips.deb stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody5_mips.deb stable/main/binary-mips/xutils_4.1.0-16woody5_mips.deb stable/main/binary-mips/libdps1-dbg_4.1.0-16woody5_mips.deb stable/main/binary-mips/xbase-clients_4.1.0-16woody5_mips.deb stable/main/binary-mips/xdm_4.1.0-16woody5_mips.deb stable/main/binary-mips/xserver-xfree86_4.1.0-16woody5_mips.deb stable/main/binary-mips/xserver-common_4.1.0-16woody5_mips.deb stable/main/binary-mips/xprt_4.1.0-16woody5_mips.deb stable/main/binary-mips/lbxproxy_4.1.0-16woody5_mips.deb stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody5_mips.deb stable/main/binary-mips/xterm_4.1.0-16woody5_mips.deb stable/main/binary-mips/xmh_4.1.0-16woody5_mips.deb stable/main/binary-mips/x-window-system-core_4.1.0-16woody5_mips.deb stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody5_mips.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-m68k/xdm_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xbase-clients_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibs-dev_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw7_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xfs_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libdps-dev_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xprt_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xfwp_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/proxymngr_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xnest_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibmesa3_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xvfb_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibs-pic_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xutils_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libdps1_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xlibs_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/x-window-system-core_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xserver-common_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xterm_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/xmh_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/libxaw6_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/lbxproxy_4.1.0-16woody5_m68k.deb stable/main/binary-m68k/twm_4.1.0-16woody5_m68k.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-ia64/xlibs-pic_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibs_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libdps1_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xmh_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw6_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xfwp_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xbase-clients_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xvfb_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xprt_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw7_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/lbxproxy_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libdps-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xserver-common_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xutils_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xdm_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibs-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/x-window-system-core_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xterm_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xfs_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibmesa3_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/proxymngr_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/xnest_4.1.0-16woody5_ia64.deb stable/main/binary-ia64/twm_4.1.0-16woody5_ia64.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-i386/libdps1-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody5_i386.deb stable/main/binary-i386/xfwp_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw6_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw7_4.1.0-16woody5_i386.deb stable/main/binary-i386/xserver-common_4.1.0-16woody5_i386.deb stable/main/binary-i386/xserver-xfree86_4.1.0-16woody5_i386.deb stable/main/binary-i386/proxymngr_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw7-dev_4.1.0-16woody5_i386.deb stable/main/binary-i386/xvfb_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw6-dev_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/x-window-system-core_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibs-pic_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibosmesa3_4.1.0-16woody5_i386.deb stable/main/binary-i386/libdps-dev_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibmesa3_4.1.0-16woody5_i386.deb stable/main/binary-i386/lbxproxy_4.1.0-16woody5_i386.deb stable/main/binary-i386/xbase-clients_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibs-dev_4.1.0-16woody5_i386.deb stable/main/binary-i386/twm_4.1.0-16woody5_i386.deb stable/main/binary-i386/xmh_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/libdps1_4.1.0-16woody5_i386.deb stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/xnest_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibs_4.1.0-16woody5_i386.deb stable/main/binary-i386/xprt_4.1.0-16woody5_i386.deb stable/main/binary-i386/xutils_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibs-dbg_4.1.0-16woody5_i386.deb stable/main/binary-i386/xdm_4.1.0-16woody5_i386.deb stable/main/binary-i386/xterm_4.1.0-16woody5_i386.deb stable/main/binary-i386/xfs_4.1.0-16woody5_i386.deb stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody5_i386.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xdm_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xbase-clients_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libdps-dev_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xnest_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libdps1_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/x-window-system-core_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xfs_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xvfb_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw7_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xmh_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw6_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xfwp_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/lbxproxy_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibs_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xterm_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibs-dev_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/proxymngr_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xutils_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xserver-common_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibs-pic_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/twm_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xlibmesa3_4.1.0-16woody5_hppa.deb stable/main/binary-hppa/xprt_4.1.0-16woody5_hppa.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-arm/lbxproxy_4.1.0-16woody5_arm.deb stable/main/binary-arm/libdps1-dbg_4.1.0-16woody5_arm.deb stable/main/binary-arm/xserver-xfree86_4.1.0-16woody5_arm.deb stable/main/binary-arm/xnest_4.1.0-16woody5_arm.deb stable/main/binary-arm/xutils_4.1.0-16woody5_arm.deb stable/main/binary-arm/twm_4.1.0-16woody5_arm.deb stable/main/binary-arm/xdm_4.1.0-16woody5_arm.deb stable/main/binary-arm/xserver-common_4.1.0-16woody5_arm.deb stable/main/binary-arm/xfwp_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody5_arm.deb stable/main/binary-arm/x-window-system-core_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibs-pic_4.1.0-16woody5_arm.deb stable/main/binary-arm/xprt_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibmesa3_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibs_4.1.0-16woody5_arm.deb stable/main/binary-arm/xterm_4.1.0-16woody5_arm.deb stable/main/binary-arm/xfs_4.1.0-16woody5_arm.deb stable/main/binary-arm/libdps-dev_4.1.0-16woody5_arm.deb stable/main/binary-arm/xvfb_4.1.0-16woody5_arm.deb stable/main/binary-arm/xbase-clients_4.1.0-16woody5_arm.deb stable/main/binary-arm/libdps1_4.1.0-16woody5_arm.deb stable/main/binary-arm/proxymngr_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw7-dev_4.1.0-16woody5_arm.deb stable/main/binary-arm/xmh_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibs-dev_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw6-dev_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibs-dbg_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw6_4.1.0-16woody5_arm.deb stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody5_arm.deb stable/main/binary-arm/libxaw7_4.1.0-16woody5_arm.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-alpha/libxaw6_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/lbxproxy_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xterm_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibs-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xutils_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibs-pic_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xnest_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xprt_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xbase-clients_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibmesa3_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/twm_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/x-window-system-core_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libdps-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libdps1_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xserver-common_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xdm_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibs_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xvfb_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/proxymngr_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xfwp_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xmh_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/libxaw7_4.1.0-16woody5_alpha.deb stable/main/binary-alpha/xfs_4.1.0-16woody5_alpha.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-powerpc/xbase-clients_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xnest_4.1.0-16woody5_powerpc.deb stable/main/source/xfree86_4.1.0-16woody5.diff.gz stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody5_powerpc.deb stable/main/source/xfree86_4.1.0-16woody5.dsc stable/main/binary-all/xfonts-scalable_4.1.0-16woody5_all.deb stable/main/binary-all/xlib6g_4.1.0-16woody5_all.deb stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libdps1_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xdm_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xspecs_4.1.0-16woody5_all.deb stable/main/binary-powerpc/proxymngr_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-pex_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libdps-dev_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfree86-common_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libxaw7_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody5_all.deb stable/main/binary-powerpc/xfs_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xlib6g-dev_4.1.0-16woody5_all.deb stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody5_all.deb stable/main/binary-powerpc/xlibs_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xvfb_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-base_4.1.0-16woody5_all.deb stable/main/binary-all/xfonts-100dpi_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libxaw6_4.1.0-16woody5_powerpc.deb stable/main/binary-all/x-window-system_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xprt_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xterm_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xfwp_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xmh_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xutils_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xserver-common_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody5_all.deb stable/main/binary-powerpc/twm_4.1.0-16woody5_powerpc.deb stable/main/binary-all/xfonts-75dpi_4.1.0-16woody5_all.deb stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody5_powerpc.deb stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody5_powerpc.deb xfree86 (4.1.0-16woody5) stable-security; urgency=low * Security update release. Resolves the following issue: + CAN-2004-0914: memory leak, improper use of signed integers, and overflow corrections in the Xpm library * Resync offset in patch #400. stable/main/binary-sparc/xaos_3.0-23.woody2_sparc.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-s390/xaos_3.0-23.woody2_s390.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-powerpc/xaos_3.0-23.woody2_powerpc.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-mipsel/xaos_3.0-23.woody2_mipsel.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-mips/xaos_3.0-23.woody2_mips.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-m68k/xaos_3.0-23.woody2_m68k.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-ia64/xaos_3.0-23.woody2_ia64.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-hppa/xaos_3.0-23.woody2_hppa.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-arm/xaos_3.0-23.woody2_arm.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/binary-alpha/xaos_3.0-23.woody2_alpha.deb xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/source/xaos_3.0-23.woody2.diff.gz stable/main/binary-i386/xaos_3.0-23.woody2_i386.deb stable/main/source/xaos_3.0-23.woody2.dsc xaos (3.0-23.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number so it is higher than 3.0-23woody1 and 3.0-23.0.1 (binNMU for S/390). * No code changes stable/main/source/viewcvs_0.9.2-4woody1.diff.gz stable/main/binary-all/viewcvs_0.9.2-4woody1_all.deb stable/main/source/viewcvs_0.9.2-4woody1.dsc viewcvs (0.9.2-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to honor hide_cvsroot and forbidden when making a tarball [lib/viewcvs.py, CAN-2004-0915] stable/main/binary-sparc/libtiff3g-dev_3.5.5-6.woody3_sparc.deb stable/main/binary-sparc/libtiff-tools_3.5.5-6.woody3_sparc.deb stable/main/binary-sparc/libtiff3g_3.5.5-6.woody3_sparc.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-s390/libtiff3g_3.5.5-6.woody3_s390.deb stable/main/binary-s390/libtiff-tools_3.5.5-6.woody3_s390.deb stable/main/binary-s390/libtiff3g-dev_3.5.5-6.woody3_s390.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-powerpc/libtiff3g_3.5.5-6.woody3_powerpc.deb stable/main/binary-powerpc/libtiff3g-dev_3.5.5-6.woody3_powerpc.deb stable/main/binary-powerpc/libtiff-tools_3.5.5-6.woody3_powerpc.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-mips/libtiff-tools_3.5.5-6.woody3_mips.deb stable/main/binary-mips/libtiff3g_3.5.5-6.woody3_mips.deb stable/main/binary-mips/libtiff3g-dev_3.5.5-6.woody3_mips.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-m68k/libtiff3g_3.5.5-6.woody3_m68k.deb stable/main/binary-m68k/libtiff-tools_3.5.5-6.woody3_m68k.deb stable/main/binary-m68k/libtiff3g-dev_3.5.5-6.woody3_m68k.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-ia64/libtiff3g-dev_3.5.5-6.woody3_ia64.deb stable/main/binary-ia64/libtiff-tools_3.5.5-6.woody3_ia64.deb stable/main/binary-ia64/libtiff3g_3.5.5-6.woody3_ia64.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-i386/libtiff3g-dev_3.5.5-6.woody3_i386.deb stable/main/binary-i386/libtiff-tools_3.5.5-6.woody3_i386.deb stable/main/binary-i386/libtiff3g_3.5.5-6.woody3_i386.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-hppa/libtiff-tools_3.5.5-6.woody3_hppa.deb stable/main/binary-hppa/libtiff3g_3.5.5-6.woody3_hppa.deb stable/main/binary-hppa/libtiff3g-dev_3.5.5-6.woody3_hppa.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-arm/libtiff-tools_3.5.5-6.woody3_arm.deb stable/main/binary-arm/libtiff3g-dev_3.5.5-6.woody3_arm.deb stable/main/binary-arm/libtiff3g_3.5.5-6.woody3_arm.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-alpha/libtiff3g_3.5.5-6.woody3_alpha.deb stable/main/binary-alpha/libtiff-tools_3.5.5-6.woody3_alpha.deb stable/main/binary-alpha/libtiff3g-dev_3.5.5-6.woody3_alpha.deb tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-mipsel/libtiff-tools_3.5.5-6.woody3_mipsel.deb stable/main/source/tiff_3.5.5-6.woody3.dsc stable/main/binary-mipsel/libtiff3g_3.5.5-6.woody3_mipsel.deb stable/main/binary-mipsel/libtiff3g-dev_3.5.5-6.woody3_mipsel.deb stable/main/source/tiff_3.5.5-6.woody3.diff.gz tiff (3.5.5-6.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added fix to prevent buffer overflows [libtiff/tif_dirread.c, libtiff/tif_fax3.c, CAN-2004-1308] stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.3_sparc.deb stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.3_sparc.deb stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.3_sparc.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.3_s390.deb stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.3_s390.deb stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.3_s390.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.3_powerpc.deb stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.3_powerpc.deb stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.3_powerpc.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.3_mips.deb stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.3_mips.deb stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.3_mips.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.3_m68k.deb stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.3_m68k.deb stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.3_m68k.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.3_ia64.deb stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.3_ia64.deb stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.3_ia64.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.3_i386.deb stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.3_i386.deb stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.3_i386.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.3_hppa.deb stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.3_hppa.deb stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.3_hppa.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.3_arm.deb stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.3_arm.deb stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.3_arm.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.3_alpha.deb stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.3_alpha.deb stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.3_alpha.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.3_mipsel.deb stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.3_mipsel.deb stable/main/source/tetex-bin_1.0.7+20011202-7.3.dsc stable/main/source/tetex-bin_1.0.7+20011202-7.3.tar.gz stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.3_mipsel.deb tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported more fixes for several integer overflows in the xpdf library included in tetex-bin, thanks to Frank Küster [libs/xpdf/xpdf/XRef.cc] * Changed arguments to size_t instead of int for several functions [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h] stable/main/binary-sparc/sudo_1.6.6-1.3_sparc.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-s390/sudo_1.6.6-1.3_s390.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-powerpc/sudo_1.6.6-1.3_powerpc.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-mips/sudo_1.6.6-1.3_mips.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-m68k/sudo_1.6.6-1.3_m68k.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-ia64/sudo_1.6.6-1.3_ia64.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-i386/sudo_1.6.6-1.3_i386.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-hppa/sudo_1.6.6-1.3_hppa.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-arm/sudo_1.6.6-1.3_arm.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-alpha/sudo_1.6.6-1.3_alpha.deb sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-mipsel/sudo_1.6.6-1.3_mipsel.deb stable/main/source/sudo_1.6.6-1.3.dsc stable/main/source/sudo_1.6.6-1.3.diff.gz sudo (1.6.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Removed debugging code again. Sorry. stable/main/binary-sparc/squid_2.4.6-2woody4_sparc.deb stable/main/binary-sparc/squid-cgi_2.4.6-2woody4_sparc.deb stable/main/binary-sparc/squidclient_2.4.6-2woody4_sparc.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-s390/squid_2.4.6-2woody4_s390.deb stable/main/binary-s390/squid-cgi_2.4.6-2woody4_s390.deb stable/main/binary-s390/squidclient_2.4.6-2woody4_s390.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-powerpc/squid_2.4.6-2woody4_powerpc.deb stable/main/binary-powerpc/squidclient_2.4.6-2woody4_powerpc.deb stable/main/binary-powerpc/squid-cgi_2.4.6-2woody4_powerpc.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-mips/squid_2.4.6-2woody4_mips.deb stable/main/binary-mips/squidclient_2.4.6-2woody4_mips.deb stable/main/binary-mips/squid-cgi_2.4.6-2woody4_mips.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-m68k/squidclient_2.4.6-2woody4_m68k.deb stable/main/binary-m68k/squid_2.4.6-2woody4_m68k.deb stable/main/binary-m68k/squid-cgi_2.4.6-2woody4_m68k.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-ia64/squidclient_2.4.6-2woody4_ia64.deb stable/main/binary-ia64/squid-cgi_2.4.6-2woody4_ia64.deb stable/main/binary-ia64/squid_2.4.6-2woody4_ia64.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-i386/squid-cgi_2.4.6-2woody4_i386.deb stable/main/binary-i386/squidclient_2.4.6-2woody4_i386.deb stable/main/binary-i386/squid_2.4.6-2woody4_i386.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-hppa/squid_2.4.6-2woody4_hppa.deb stable/main/binary-hppa/squidclient_2.4.6-2woody4_hppa.deb stable/main/binary-hppa/squid-cgi_2.4.6-2woody4_hppa.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-arm/squid-cgi_2.4.6-2woody4_arm.deb stable/main/binary-arm/squidclient_2.4.6-2woody4_arm.deb stable/main/binary-arm/squid_2.4.6-2woody4_arm.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-alpha/squidclient_2.4.6-2woody4_alpha.deb stable/main/binary-alpha/squid_2.4.6-2woody4_alpha.deb stable/main/binary-alpha/squid-cgi_2.4.6-2woody4_alpha.deb squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-mipsel/squidclient_2.4.6-2woody4_mipsel.deb stable/main/binary-mipsel/squid-cgi_2.4.6-2woody4_mipsel.deb stable/main/source/squid_2.4.6-2woody4.dsc stable/main/binary-mipsel/squid_2.4.6-2woody4_mipsel.deb stable/main/source/squid_2.4.6-2woody4.diff.gz squid (2.4.6-2woody4) stable-security; urgency=high * Upload to stable-security because of security issues * Added upstream patch for CAN-2004-0918 o squid-2.5.STABLE6-SNMP_core_dump.patch stable/main/binary-sparc/passwd_20000902-12woody1_sparc.deb stable/main/binary-sparc/login_20000902-12woody1_sparc.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-s390/passwd_20000902-12woody1_s390.deb stable/main/binary-s390/login_20000902-12woody1_s390.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-powerpc/passwd_20000902-12woody1_powerpc.deb stable/main/binary-powerpc/login_20000902-12woody1_powerpc.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-mips/passwd_20000902-12woody1_mips.deb stable/main/binary-mips/login_20000902-12woody1_mips.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-m68k/login_20000902-12woody1_m68k.deb stable/main/binary-m68k/passwd_20000902-12woody1_m68k.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-ia64/passwd_20000902-12woody1_ia64.deb stable/main/binary-ia64/login_20000902-12woody1_ia64.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-i386/login_20000902-12woody1_i386.deb stable/main/binary-i386/passwd_20000902-12woody1_i386.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-hppa/passwd_20000902-12woody1_hppa.deb stable/main/binary-hppa/login_20000902-12woody1_hppa.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-arm/login_20000902-12woody1_arm.deb stable/main/binary-arm/passwd_20000902-12woody1_arm.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-alpha/login_20000902-12woody1_alpha.deb stable/main/binary-alpha/passwd_20000902-12woody1_alpha.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/source/shadow_20000902-12woody1.dsc stable/main/binary-mipsel/passwd_20000902-12woody1_mipsel.deb stable/main/source/shadow_20000902-12woody1.diff.gz stable/main/binary-mipsel/login_20000902-12woody1_mipsel.deb shadow (20000902-12woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted password check to fix authentication bypass [debian/patches/036_CAN-2004-1001_passwd_check] stable/main/binary-sparc/libruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libreadline-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libtcltk-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libpty-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libtk-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/ruby-dev_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libsyslog-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libnkf-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libsdbm-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libcurses-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libgdbm-ruby_1.6.7-3woody4_sparc.deb stable/main/binary-sparc/libdbm-ruby_1.6.7-3woody4_sparc.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-s390/libgdbm-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libpty-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libtcltk-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libsyslog-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libtk-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libreadline-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/ruby-dev_1.6.7-3woody4_s390.deb stable/main/binary-s390/libcurses-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libdbm-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libsdbm-ruby_1.6.7-3woody4_s390.deb stable/main/binary-s390/libnkf-ruby_1.6.7-3woody4_s390.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-powerpc/libtk-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/ruby-dev_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libpty-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libsdbm-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libsyslog-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libdbm-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libcurses-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libreadline-ruby_1.6.7-3woody4_powerpc.deb stable/main/binary-powerpc/libnkf-ruby_1.6.7-3woody4_powerpc.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-mipsel/libruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libdbm-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libnkf-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libtk-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/ruby-dev_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libsyslog-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libreadline-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libsdbm-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libcurses-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/libpty-ruby_1.6.7-3woody4_mipsel.deb stable/main/binary-mipsel/ruby_1.6.7-3woody4_mipsel.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-mips/libtk-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libsyslog-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libnkf-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/ruby-dev_1.6.7-3woody4_mips.deb stable/main/binary-mips/libgdbm-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libtcltk-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libdbm-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libsdbm-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libreadline-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libcurses-ruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libruby_1.6.7-3woody4_mips.deb stable/main/binary-mips/libpty-ruby_1.6.7-3woody4_mips.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-m68k/ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libsdbm-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libcurses-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libreadline-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libpty-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libsyslog-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libnkf-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libtk-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libdbm-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libtcltk-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libgdbm-ruby_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/ruby-dev_1.6.7-3woody4_m68k.deb stable/main/binary-m68k/libruby_1.6.7-3woody4_m68k.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-ia64/libreadline-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libgdbm-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libcurses-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/ruby-dev_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libtk-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libdbm-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libtcltk-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libsyslog-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libpty-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libnkf-ruby_1.6.7-3woody4_ia64.deb stable/main/binary-ia64/libsdbm-ruby_1.6.7-3woody4_ia64.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-hppa/libsdbm-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libtcltk-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libcurses-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libdbm-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/ruby-dev_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libsyslog-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libtk-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libgdbm-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libnkf-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libpty-ruby_1.6.7-3woody4_hppa.deb stable/main/binary-hppa/libreadline-ruby_1.6.7-3woody4_hppa.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-arm/libsyslog-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libtk-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libnkf-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libpty-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/ruby-dev_1.6.7-3woody4_arm.deb stable/main/binary-arm/libdbm-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libreadline-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libsdbm-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libtcltk-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libgdbm-ruby_1.6.7-3woody4_arm.deb stable/main/binary-arm/libcurses-ruby_1.6.7-3woody4_arm.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-alpha/libtcltk-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libgdbm-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libsyslog-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libpty-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libtk-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/ruby-dev_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libcurses-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libnkf-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libdbm-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libsdbm-ruby_1.6.7-3woody4_alpha.deb stable/main/binary-alpha/libreadline-ruby_1.6.7-3woody4_alpha.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-i386/libsdbm-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libdbm-ruby_1.6.7-3woody4_i386.deb stable/main/binary-all/irb_1.6.7-3woody4_all.deb stable/main/binary-i386/libnkf-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libtk-ruby_1.6.7-3woody4_i386.deb stable/main/binary-all/ruby-elisp_1.6.7-3woody4_all.deb stable/main/source/ruby_1.6.7-3woody4.dsc stable/main/binary-i386/libruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libsyslog-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libpty-ruby_1.6.7-3woody4_i386.deb stable/main/binary-all/ruby-examples_1.6.7-3woody4_all.deb stable/main/source/ruby_1.6.7-3woody4.diff.gz stable/main/binary-i386/libtcltk-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/ruby-dev_1.6.7-3woody4_i386.deb stable/main/binary-i386/libreadline-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libgdbm-ruby_1.6.7-3woody4_i386.deb stable/main/binary-i386/libcurses-ruby_1.6.7-3woody4_i386.deb ruby (1.6.7-3woody4) stable-security; urgency=high * added debian/patches/811_cgi.patch: - When CGI.rb receives wrong POST request, it will get into an infinite loop. stable/main/binary-sparc/rlpr_2.02-7woody1_sparc.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-s390/rlpr_2.02-7woody1_s390.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-powerpc/rlpr_2.02-7woody1_powerpc.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-mipsel/rlpr_2.02-7woody1_mipsel.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-mips/rlpr_2.02-7woody1_mips.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-m68k/rlpr_2.02-7woody1_m68k.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-ia64/rlpr_2.02-7woody1_ia64.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-hppa/rlpr_2.02-7woody1_hppa.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-arm/rlpr_2.02-7woody1_arm.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-alpha/rlpr_2.02-7woody1_alpha.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/source/rlpr_2.02-7woody1.dsc stable/main/source/rlpr_2.02-7woody1.diff.gz stable/main/binary-i386/rlpr_2.02-7woody1_i386.deb rlpr (2.02-7woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in msg() (CAN-2004-0393) * Fix buffer overflow vulnerability in msg() (CAN-2004-0454) stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/libpgsql2_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/python-pygresql_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/postgresql-client_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/libecpg3_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/postgresql-dev_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/libpgtcl_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/libpgperl_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/postgresql_7.2.1-2woody6_sparc.deb stable/main/binary-sparc/pgaccess_7.2.1-2woody6_sparc.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-s390/libpgtcl_7.2.1-2woody6_s390.deb stable/main/binary-s390/postgresql_7.2.1-2woody6_s390.deb stable/main/binary-s390/libpgperl_7.2.1-2woody6_s390.deb stable/main/binary-s390/postgresql-dev_7.2.1-2woody6_s390.deb stable/main/binary-s390/python-pygresql_7.2.1-2woody6_s390.deb stable/main/binary-s390/pgaccess_7.2.1-2woody6_s390.deb stable/main/binary-s390/libpgsql2_7.2.1-2woody6_s390.deb stable/main/binary-s390/odbc-postgresql_7.2.1-2woody6_s390.deb stable/main/binary-s390/libecpg3_7.2.1-2woody6_s390.deb stable/main/binary-s390/postgresql-client_7.2.1-2woody6_s390.deb stable/main/binary-s390/postgresql-contrib_7.2.1-2woody6_s390.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-powerpc/postgresql_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/libecpg3_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/pgaccess_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/python-pygresql_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/libpgperl_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/libpgsql2_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody6_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody6_powerpc.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-mipsel/libpgsql2_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/pgaccess_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/libecpg3_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/postgresql_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/python-pygresql_7.2.1-2woody6_mipsel.deb stable/main/binary-mipsel/libpgperl_7.2.1-2woody6_mipsel.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-mips/python-pygresql_7.2.1-2woody6_mips.deb stable/main/binary-mips/libpgperl_7.2.1-2woody6_mips.deb stable/main/binary-mips/pgaccess_7.2.1-2woody6_mips.deb stable/main/binary-mips/libpgsql2_7.2.1-2woody6_mips.deb stable/main/binary-mips/postgresql-dev_7.2.1-2woody6_mips.deb stable/main/binary-mips/libpgtcl_7.2.1-2woody6_mips.deb stable/main/binary-mips/postgresql_7.2.1-2woody6_mips.deb stable/main/binary-mips/libecpg3_7.2.1-2woody6_mips.deb stable/main/binary-mips/postgresql-contrib_7.2.1-2woody6_mips.deb stable/main/binary-mips/postgresql-client_7.2.1-2woody6_mips.deb stable/main/binary-mips/odbc-postgresql_7.2.1-2woody6_mips.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-m68k/python-pygresql_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/pgaccess_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/libecpg3_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/libpgperl_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/postgresql-client_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/postgresql-dev_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/libpgtcl_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/libpgsql2_7.2.1-2woody6_m68k.deb stable/main/binary-m68k/postgresql_7.2.1-2woody6_m68k.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-ia64/postgresql_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/libpgtcl_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/python-pygresql_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/pgaccess_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/postgresql-client_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/libpgperl_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/libecpg3_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/postgresql-dev_7.2.1-2woody6_ia64.deb stable/main/binary-ia64/libpgsql2_7.2.1-2woody6_ia64.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/pgaccess_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/libecpg3_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/postgresql-dev_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/postgresql_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/libpgperl_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/postgresql-client_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/libpgsql2_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/python-pygresql_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/libpgtcl_7.2.1-2woody6_hppa.deb stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody6_hppa.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-arm/postgresql-dev_7.2.1-2woody6_arm.deb stable/main/binary-arm/libpgperl_7.2.1-2woody6_arm.deb stable/main/binary-arm/python-pygresql_7.2.1-2woody6_arm.deb stable/main/binary-arm/pgaccess_7.2.1-2woody6_arm.deb stable/main/binary-arm/postgresql_7.2.1-2woody6_arm.deb stable/main/binary-arm/libecpg3_7.2.1-2woody6_arm.deb stable/main/binary-arm/postgresql-client_7.2.1-2woody6_arm.deb stable/main/binary-arm/postgresql-contrib_7.2.1-2woody6_arm.deb stable/main/binary-arm/libpgtcl_7.2.1-2woody6_arm.deb stable/main/binary-arm/libpgsql2_7.2.1-2woody6_arm.deb stable/main/binary-arm/odbc-postgresql_7.2.1-2woody6_arm.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/python-pygresql_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/postgresql-dev_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/libpgperl_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/postgresql-client_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/libecpg3_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/pgaccess_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/libpgsql2_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/postgresql_7.2.1-2woody6_alpha.deb stable/main/binary-alpha/libpgtcl_7.2.1-2woody6_alpha.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-i386/postgresql_7.2.1-2woody6_i386.deb stable/main/binary-i386/libpgsql2_7.2.1-2woody6_i386.deb stable/main/source/postgresql_7.2.1-2woody6.dsc stable/main/binary-i386/odbc-postgresql_7.2.1-2woody6_i386.deb stable/main/binary-i386/postgresql-client_7.2.1-2woody6_i386.deb stable/main/binary-i386/postgresql-dev_7.2.1-2woody6_i386.deb stable/main/binary-i386/pgaccess_7.2.1-2woody6_i386.deb stable/main/binary-i386/libecpg3_7.2.1-2woody6_i386.deb stable/main/binary-i386/postgresql-contrib_7.2.1-2woody6_i386.deb stable/main/binary-all/postgresql-doc_7.2.1-2woody6_all.deb stable/main/source/postgresql_7.2.1-2woody6.diff.gz stable/main/binary-i386/libpgperl_7.2.1-2woody6_i386.deb stable/main/binary-i386/libpgtcl_7.2.1-2woody6_i386.deb stable/main/binary-i386/python-pygresql_7.2.1-2woody6_i386.deb postgresql (7.2.1-2woody6) stable-security; urgency=high * Security upload to fix insecure temporary file handling in contrib/findoidjoins/make_oidjoins_check: - use version from upstream release 7.2.6 as basis (introduces proper variables for the file names instead of repeatedly constructing them inline) - upstream still uses the $$ method for constructing file names; changed that to use mktemp * References: CAN-2004-0977 http://www.postgresql.org/news/234.html http://bugs.debian.org/278336 stable/main/binary-sparc/openssl_0.9.6c-2.woody.7_sparc.deb stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.7_sparc.deb stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.7_sparc.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.7_s390.deb stable/main/binary-s390/openssl_0.9.6c-2.woody.7_s390.deb stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.7_s390.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.7_powerpc.deb stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.7_powerpc.deb stable/main/binary-powerpc/openssl_0.9.6c-2.woody.7_powerpc.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.7_mips.deb stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.7_mips.deb stable/main/binary-mips/openssl_0.9.6c-2.woody.7_mips.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.7_m68k.deb stable/main/binary-m68k/openssl_0.9.6c-2.woody.7_m68k.deb stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.7_m68k.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.7_ia64.deb stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.7_ia64.deb stable/main/binary-ia64/openssl_0.9.6c-2.woody.7_ia64.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-i386/openssl_0.9.6c-2.woody.7_i386.deb stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.7_i386.deb stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.7_i386.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-hppa/openssl_0.9.6c-2.woody.7_hppa.deb stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.7_hppa.deb stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.7_hppa.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.7_arm.deb stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.7_arm.deb stable/main/binary-arm/openssl_0.9.6c-2.woody.7_arm.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.7_alpha.deb stable/main/binary-alpha/openssl_0.9.6c-2.woody.7_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.7_alpha.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.7_mipsel.deb stable/main/binary-all/ssleay_0.9.6c-2.woody.7_all.deb stable/main/source/openssl_0.9.6c-2.woody.7.dsc stable/main/source/openssl_0.9.6c-2.woody.7.diff.gz stable/main/binary-mipsel/openssl_0.9.6c-2.woody.7_mipsel.deb stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.7_mipsel.deb openssl (0.9.6c-2.woody.7) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied patch by Martin Pitt to fix insecure temporary file creation by replacing $$-style creation of temporary files with File::Temp::tempfile() [apps/der_chop, CAN-2004-0975] stable/main/binary-sparc/oftpd_0.3.6-6_sparc.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-s390/oftpd_0.3.6-6_s390.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-powerpc/oftpd_0.3.6-6_powerpc.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-mipsel/oftpd_0.3.6-6_mipsel.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-mips/oftpd_0.3.6-6_mips.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-m68k/oftpd_0.3.6-6_m68k.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-ia64/oftpd_0.3.6-6_ia64.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-hppa/oftpd_0.3.6-6_hppa.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-arm/oftpd_0.3.6-6_arm.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-alpha/oftpd_0.3.6-6_alpha.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/source/oftpd_0.3.6-6.diff.gz stable/main/source/oftpd_0.3.6-6.dsc stable/main/binary-i386/oftpd_0.3.6-6_i386.deb oftpd (0.3.6-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376) stable/main/binary-sparc/nhfsstone_1.0-2woody3_sparc.deb stable/main/binary-sparc/nfs-kernel-server_1.0-2woody3_sparc.deb stable/main/binary-sparc/nfs-common_1.0-2woody3_sparc.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-s390/nfs-common_1.0-2woody3_s390.deb stable/main/binary-s390/nhfsstone_1.0-2woody3_s390.deb stable/main/binary-s390/nfs-kernel-server_1.0-2woody3_s390.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody3_powerpc.deb stable/main/binary-powerpc/nfs-common_1.0-2woody3_powerpc.deb stable/main/binary-powerpc/nhfsstone_1.0-2woody3_powerpc.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-mips/nhfsstone_1.0-2woody3_mips.deb stable/main/binary-mips/nfs-kernel-server_1.0-2woody3_mips.deb stable/main/binary-mips/nfs-common_1.0-2woody3_mips.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-m68k/nfs-kernel-server_1.0-2woody3_m68k.deb stable/main/binary-m68k/nhfsstone_1.0-2woody3_m68k.deb stable/main/binary-m68k/nfs-common_1.0-2woody3_m68k.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-ia64/nfs-kernel-server_1.0-2woody3_ia64.deb stable/main/binary-ia64/nfs-common_1.0-2woody3_ia64.deb stable/main/binary-ia64/nhfsstone_1.0-2woody3_ia64.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-i386/nfs-common_1.0-2woody3_i386.deb stable/main/binary-i386/nfs-kernel-server_1.0-2woody3_i386.deb stable/main/binary-i386/nhfsstone_1.0-2woody3_i386.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-hppa/nhfsstone_1.0-2woody3_hppa.deb stable/main/binary-hppa/nfs-common_1.0-2woody3_hppa.deb stable/main/binary-hppa/nfs-kernel-server_1.0-2woody3_hppa.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-arm/nhfsstone_1.0-2woody3_arm.deb stable/main/binary-arm/nfs-common_1.0-2woody3_arm.deb stable/main/binary-arm/nfs-kernel-server_1.0-2woody3_arm.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-alpha/nhfsstone_1.0-2woody3_alpha.deb stable/main/binary-alpha/nfs-common_1.0-2woody3_alpha.deb stable/main/binary-alpha/nfs-kernel-server_1.0-2woody3_alpha.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/source/nfs-utils_1.0-2woody3.dsc stable/main/binary-mipsel/nhfsstone_1.0-2woody3_mipsel.deb stable/main/binary-mipsel/nfs-common_1.0-2woody3_mipsel.deb stable/main/source/nfs-utils_1.0-2woody3.tar.gz stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody3_mipsel.deb nfs-utils (1:1.0-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch by SGI to fix DoS [utils/statd/statd.c, CAN-2004-1014] * Bumped up the version number to nullify that fixed a problem in unused code stable/main/binary-sparc/netpbm_9.20-8.4_sparc.deb stable/main/binary-sparc/libnetpbm9_9.20-8.4_sparc.deb stable/main/binary-sparc/libnetpbm9-dev_9.20-8.4_sparc.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-s390/libnetpbm9-dev_9.20-8.4_s390.deb stable/main/binary-s390/netpbm_9.20-8.4_s390.deb stable/main/binary-s390/libnetpbm9_9.20-8.4_s390.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-powerpc/netpbm_9.20-8.4_powerpc.deb stable/main/binary-powerpc/libnetpbm9_9.20-8.4_powerpc.deb stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.4_powerpc.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.4_mipsel.deb stable/main/binary-mipsel/netpbm_9.20-8.4_mipsel.deb stable/main/binary-mipsel/libnetpbm9_9.20-8.4_mipsel.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-mips/libnetpbm9-dev_9.20-8.4_mips.deb stable/main/binary-mips/libnetpbm9_9.20-8.4_mips.deb stable/main/binary-mips/netpbm_9.20-8.4_mips.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-m68k/libnetpbm9_9.20-8.4_m68k.deb stable/main/binary-m68k/libnetpbm9-dev_9.20-8.4_m68k.deb stable/main/binary-m68k/netpbm_9.20-8.4_m68k.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-ia64/libnetpbm9-dev_9.20-8.4_ia64.deb stable/main/binary-ia64/libnetpbm9_9.20-8.4_ia64.deb stable/main/binary-ia64/netpbm_9.20-8.4_ia64.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-hppa/netpbm_9.20-8.4_hppa.deb stable/main/binary-hppa/libnetpbm9_9.20-8.4_hppa.deb stable/main/binary-hppa/libnetpbm9-dev_9.20-8.4_hppa.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-arm/libnetpbm9-dev_9.20-8.4_arm.deb stable/main/binary-arm/libnetpbm9_9.20-8.4_arm.deb stable/main/binary-arm/netpbm_9.20-8.4_arm.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-alpha/libnetpbm9-dev_9.20-8.4_alpha.deb stable/main/binary-alpha/libnetpbm9_9.20-8.4_alpha.deb stable/main/binary-alpha/netpbm_9.20-8.4_alpha.deb netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/source/netpbm-free_9.20-8.4.diff.gz stable/main/binary-i386/netpbm_9.20-8.4_i386.deb stable/main/binary-i386/libnetpbm9_9.20-8.4_i386.deb stable/main/binary-i386/libnetpbm9-dev_9.20-8.4_i386.deb stable/main/source/netpbm-free_9.20-8.4.dsc netpbm-free (2:9.20-8.4) stable-security; urgency=high * Maintainer upload, uploaded by the Security Team * Fixed more tmpfile-problems, see also Bug #219019 stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody3_sparc.deb stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody3_sparc.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody3_s390.deb stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody3_s390.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody3_powerpc.deb stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody3_powerpc.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody3_mips.deb stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody3_mips.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody3_m68k.deb stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody3_m68k.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody3_ia64.deb stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody3_ia64.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody3_i386.deb stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody3_i386.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody3_hppa.deb stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody3_hppa.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody3_arm.deb stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody3_arm.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody3_alpha.deb stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody3_alpha.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody3_mipsel.deb stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody3.diff.gz stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody3.dsc stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody3_mipsel.deb netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed format string vulnerability discovered by Joel Eriksson [telnetd/telnetd.c, CAN-2004-0998] stable/non-free/binary-i386/mpg123-esd_0.59r-13woody4_i386.deb stable/non-free/binary-arm/mpg123_0.59r-13woody4_arm.deb stable/non-free/binary-powerpc/mpg123-esd_0.59r-13woody4_powerpc.deb stable/non-free/binary-alpha/mpg123-esd_0.59r-13woody4_alpha.deb stable/non-free/binary-i386/mpg123_0.59r-13woody4_i386.deb stable/non-free/binary-powerpc/mpg123_0.59r-13woody4_powerpc.deb stable/non-free/binary-sparc/mpg123_0.59r-13woody4_sparc.deb stable/non-free/binary-i386/mpg123-nas_0.59r-13woody4_i386.deb stable/non-free/binary-i386/mpg123-oss-3dnow_0.59r-13woody4_i386.deb stable/non-free/binary-m68k/mpg123_0.59r-13woody4_m68k.deb stable/non-free/binary-hppa/mpg123_0.59r-13woody4_hppa.deb stable/non-free/source/mpg123_0.59r-13woody4.diff.gz stable/non-free/source/mpg123_0.59r-13woody4.dsc stable/non-free/binary-i386/mpg123-oss-i486_0.59r-13woody4_i386.deb stable/non-free/binary-alpha/mpg123_0.59r-13woody4_alpha.deb mpg123 (0.59r-13woody4) stable-security; urgency=high * httpget.c: Fix yet another heap overflow in http authentication handler (CAN-2004-0982). stable/main/source/mantis_0.17.1-3.diff.gz stable/main/binary-all/mantis_0.17.1-3_all.deb stable/main/source/mantis_0.17.1-3.dsc mantis (0.17.1-3) stable-security; urgency=high * Fix insecure permissions in /etc/mantis/config.php (644) (Closes: #199022) stable/main/binary-sparc/lvm10_1.0.4-5woody2_sparc.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-s390/lvm10_1.0.4-5woody2_s390.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-powerpc/lvm10_1.0.4-5woody2_powerpc.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-mips/lvm10_1.0.4-5woody2_mips.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-m68k/lvm10_1.0.4-5woody2_m68k.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-ia64/lvm10_1.0.4-5woody2_ia64.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-i386/lvm10_1.0.4-5woody2_i386.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-hppa/lvm10_1.0.4-5woody2_hppa.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-arm/lvm10_1.0.4-5woody2_arm.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-alpha/lvm10_1.0.4-5woody2_alpha.deb lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/source/lvm10_1.0.4-5woody2.dsc stable/main/binary-mipsel/lvm10_1.0.4-5woody2_mipsel.deb stable/main/source/lvm10_1.0.4-5woody2.diff.gz lvm10 (1:1.0.4-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Trustix patch to correct insecure temporary directory creation [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972] stable/main/binary-sparc/libxml2-dev_2.4.19-4woody2_sparc.deb stable/main/binary-sparc/libxml2_2.4.19-4woody2_sparc.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-s390/libxml2_2.4.19-4woody2_s390.deb stable/main/binary-s390/libxml2-dev_2.4.19-4woody2_s390.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-powerpc/libxml2-dev_2.4.19-4woody2_powerpc.deb stable/main/binary-powerpc/libxml2_2.4.19-4woody2_powerpc.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-mips/libxml2_2.4.19-4woody2_mips.deb stable/main/binary-mips/libxml2-dev_2.4.19-4woody2_mips.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-m68k/libxml2-dev_2.4.19-4woody2_m68k.deb stable/main/binary-m68k/libxml2_2.4.19-4woody2_m68k.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-ia64/libxml2_2.4.19-4woody2_ia64.deb stable/main/binary-ia64/libxml2-dev_2.4.19-4woody2_ia64.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-i386/libxml2-dev_2.4.19-4woody2_i386.deb stable/main/binary-i386/libxml2_2.4.19-4woody2_i386.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-hppa/libxml2_2.4.19-4woody2_hppa.deb stable/main/binary-hppa/libxml2-dev_2.4.19-4woody2_hppa.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-arm/libxml2_2.4.19-4woody2_arm.deb stable/main/binary-arm/libxml2-dev_2.4.19-4woody2_arm.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-alpha/libxml2_2.4.19-4woody2_alpha.deb stable/main/binary-alpha/libxml2-dev_2.4.19-4woody2_alpha.deb libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-mipsel/libxml2_2.4.19-4woody2_mipsel.deb stable/main/source/libxml2_2.4.19-4woody2.dsc stable/main/binary-mipsel/libxml2-dev_2.4.19-4woody2_mipsel.deb stable/main/source/libxml2_2.4.19-4woody2.diff.gz libxml2 (2.4.19-4woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0989] stable/main/binary-sparc/libxml-dev_1.8.17-2woody2_sparc.deb stable/main/binary-sparc/libxml1_1.8.17-2woody2_sparc.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-s390/libxml1_1.8.17-2woody2_s390.deb stable/main/binary-s390/libxml-dev_1.8.17-2woody2_s390.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-powerpc/libxml-dev_1.8.17-2woody2_powerpc.deb stable/main/binary-powerpc/libxml1_1.8.17-2woody2_powerpc.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-mips/libxml1_1.8.17-2woody2_mips.deb stable/main/binary-mips/libxml-dev_1.8.17-2woody2_mips.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-m68k/libxml-dev_1.8.17-2woody2_m68k.deb stable/main/binary-m68k/libxml1_1.8.17-2woody2_m68k.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-ia64/libxml1_1.8.17-2woody2_ia64.deb stable/main/binary-ia64/libxml-dev_1.8.17-2woody2_ia64.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-i386/libxml-dev_1.8.17-2woody2_i386.deb stable/main/binary-i386/libxml1_1.8.17-2woody2_i386.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-hppa/libxml1_1.8.17-2woody2_hppa.deb stable/main/binary-hppa/libxml-dev_1.8.17-2woody2_hppa.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-arm/libxml1_1.8.17-2woody2_arm.deb stable/main/binary-arm/libxml-dev_1.8.17-2woody2_arm.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-alpha/libxml1_1.8.17-2woody2_alpha.deb stable/main/binary-alpha/libxml-dev_1.8.17-2woody2_alpha.deb libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/source/libxml_1.8.17-2woody2.diff.gz stable/main/binary-mipsel/libxml-dev_1.8.17-2woody2_mipsel.deb stable/main/binary-mipsel/libxml1_1.8.17-2woody2_mipsel.deb stable/main/source/libxml_1.8.17-2woody2.dsc libxml (1:1.8.17-2woody2) stable-security; urgency=high * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c, CAN-2004-0989] stable/main/binary-sparc/libgd2_2.0.1-10woody2_sparc.deb stable/main/binary-sparc/libgd-tools_2.0.1-10woody2_sparc.deb stable/main/binary-sparc/libgd2-noxpm_2.0.1-10woody2_sparc.deb stable/main/binary-sparc/libgd2-dev_2.0.1-10woody2_sparc.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-s390/libgd2_2.0.1-10woody2_s390.deb stable/main/binary-s390/libgd-tools_2.0.1-10woody2_s390.deb stable/main/binary-s390/libgd2-dev_2.0.1-10woody2_s390.deb stable/main/binary-s390/libgd2-noxpm_2.0.1-10woody2_s390.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-powerpc/libgd2-dev_2.0.1-10woody2_powerpc.deb stable/main/binary-powerpc/libgd-tools_2.0.1-10woody2_powerpc.deb stable/main/binary-powerpc/libgd2_2.0.1-10woody2_powerpc.deb stable/main/binary-powerpc/libgd2-noxpm_2.0.1-10woody2_powerpc.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-mips/libgd-tools_2.0.1-10woody2_mips.deb stable/main/binary-mips/libgd2-noxpm_2.0.1-10woody2_mips.deb stable/main/binary-mips/libgd2_2.0.1-10woody2_mips.deb stable/main/binary-mips/libgd2-dev_2.0.1-10woody2_mips.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-m68k/libgd2-noxpm_2.0.1-10woody2_m68k.deb stable/main/binary-m68k/libgd-tools_2.0.1-10woody2_m68k.deb stable/main/binary-m68k/libgd2-dev_2.0.1-10woody2_m68k.deb stable/main/binary-m68k/libgd2_2.0.1-10woody2_m68k.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-ia64/libgd2_2.0.1-10woody2_ia64.deb stable/main/binary-ia64/libgd2-noxpm_2.0.1-10woody2_ia64.deb stable/main/binary-ia64/libgd2-dev_2.0.1-10woody2_ia64.deb stable/main/binary-ia64/libgd-tools_2.0.1-10woody2_ia64.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-i386/libgd2-dev_2.0.1-10woody2_i386.deb stable/main/binary-i386/libgd2_2.0.1-10woody2_i386.deb stable/main/binary-i386/libgd2-noxpm_2.0.1-10woody2_i386.deb stable/main/binary-i386/libgd-tools_2.0.1-10woody2_i386.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-hppa/libgd2_2.0.1-10woody2_hppa.deb stable/main/binary-hppa/libgd2-noxpm_2.0.1-10woody2_hppa.deb stable/main/binary-hppa/libgd-tools_2.0.1-10woody2_hppa.deb stable/main/binary-hppa/libgd2-dev_2.0.1-10woody2_hppa.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-arm/libgd2_2.0.1-10woody2_arm.deb stable/main/binary-arm/libgd2-noxpm_2.0.1-10woody2_arm.deb stable/main/binary-arm/libgd2-dev_2.0.1-10woody2_arm.deb stable/main/binary-arm/libgd-tools_2.0.1-10woody2_arm.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-alpha/libgd-tools_2.0.1-10woody2_alpha.deb stable/main/binary-alpha/libgd2_2.0.1-10woody2_alpha.deb stable/main/binary-alpha/libgd2-noxpm_2.0.1-10woody2_alpha.deb stable/main/binary-alpha/libgd2-dev_2.0.1-10woody2_alpha.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/binary-mipsel/libgd2-noxpm_2.0.1-10woody2_mipsel.deb stable/main/binary-mipsel/libgd2_2.0.1-10woody2_mipsel.deb stable/main/source/libgd2_2.0.1-10woody2.dsc stable/main/binary-mipsel/libgd-tools_2.0.1-10woody2_mipsel.deb stable/main/source/libgd2_2.0.1-10woody2.diff.gz stable/main/binary-mipsel/libgd2-dev_2.0.1-10woody2_mipsel.deb libgd2 (2.0.1-10woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added overflow and failed malloc protections to prevend buffer overflows that could lead to arbitrary code execution [gd.c, wbmp.c, gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990] * Added missing free() [gd_png.c] * Added nother integer overflow precaution by Stew Benedict [gd_png.c] stable/main/source/libcrypt-passwdmd5-perl_1.2-3woody1.dsc stable/main/binary-all/libcrypt-passwdmd5-perl_1.2-3woody1_all.deb stable/main/source/libcrypt-passwdmd5-perl_1.2-3woody1.diff.gz libcrypt-passwdmd5-perl (1.2-3woody1) stable; urgency=medium * NMU * Added missing dependency to libdigest-md5-perl so the package is installable again (Closes: #159057) stable/main/binary-sparc/l2tpd_0.67-1.2_sparc.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-s390/l2tpd_0.67-1.2_s390.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-powerpc/l2tpd_0.67-1.2_powerpc.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-mipsel/l2tpd_0.67-1.2_mipsel.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-mips/l2tpd_0.67-1.2_mips.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-m68k/l2tpd_0.67-1.2_m68k.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-ia64/l2tpd_0.67-1.2_ia64.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-hppa/l2tpd_0.67-1.2_hppa.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-arm/l2tpd_0.67-1.2_arm.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-alpha/l2tpd_0.67-1.2_alpha.deb l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/source/l2tpd_0.67-1.2.diff.gz stable/main/binary-i386/l2tpd_0.67-1.2_i386.deb stable/main/source/l2tpd_0.67-1.2.dsc l2tpd (0.67-1.2) stable-security; urgency=high * Fix for bss based overflow in write_packet(). (CAN-2004-0649) stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody5_powerpc.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody5.dsc stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody5_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody5_powerpc.deb stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody5_all.deb stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody5_powerpc.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody5.tar.gz kernel-patch-2.4.18-powerpc (2.4.18-1woody5) stable-security; urgency=low * Built against kernel-source-2.4.18 version 2.4.18-14.3 to pick up : - Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003, drivers/char/drm-4.0/r128_state.c] - Applied additional patch by Ernie Petrides to fix another intance of the same - Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3_all.deb stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3.diff.gz stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3.dsc kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.3) stable-security; urgency=high * Rebuild against latest kernel-source-2.4.17-1woody2, which includes the follwing additional security fixes: - Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - Applied additional patch by Ernie Petrides to fix another intance of the same - Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-sparc/iptables-dev_1.2.6a-5.0woody2_sparc.deb stable/main/binary-sparc/iptables_1.2.6a-5.0woody2_sparc.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-s390/iptables_1.2.6a-5.0woody2_s390.deb stable/main/binary-s390/iptables-dev_1.2.6a-5.0woody2_s390.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-powerpc/iptables-dev_1.2.6a-5.0woody2_powerpc.deb stable/main/binary-powerpc/iptables_1.2.6a-5.0woody2_powerpc.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-mips/iptables_1.2.6a-5.0woody2_mips.deb stable/main/binary-mips/iptables-dev_1.2.6a-5.0woody2_mips.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-m68k/iptables-dev_1.2.6a-5.0woody2_m68k.deb stable/main/binary-m68k/iptables_1.2.6a-5.0woody2_m68k.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-ia64/iptables_1.2.6a-5.0woody2_ia64.deb stable/main/binary-ia64/iptables-dev_1.2.6a-5.0woody2_ia64.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-i386/iptables-dev_1.2.6a-5.0woody2_i386.deb stable/main/binary-i386/iptables_1.2.6a-5.0woody2_i386.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-hppa/iptables_1.2.6a-5.0woody2_hppa.deb stable/main/binary-hppa/iptables-dev_1.2.6a-5.0woody2_hppa.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-arm/iptables_1.2.6a-5.0woody2_arm.deb stable/main/binary-arm/iptables-dev_1.2.6a-5.0woody2_arm.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-alpha/iptables_1.2.6a-5.0woody2_alpha.deb stable/main/binary-alpha/iptables-dev_1.2.6a-5.0woody2_alpha.deb iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-mipsel/iptables_1.2.6a-5.0woody2_mipsel.deb stable/main/source/iptables_1.2.6a-5.0woody2.dsc stable/main/binary-mipsel/iptables-dev_1.2.6a-5.0woody2_mipsel.deb stable/main/source/iptables_1.2.6a-5.0woody2.diff.gz iptables (1.2.6a-5.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Mikko Rapeli to fix a bug that prevents loading of required modules [iptables.c, ip6tables.c, CAN-2004-0986] stable/main/binary-sparc/imlib-progs_1.9.14-2woody2_sparc.deb stable/main/binary-sparc/imlib1_1.9.14-2woody2_sparc.deb stable/main/binary-sparc/gdk-imlib1_1.9.14-2woody2_sparc.deb stable/main/binary-sparc/imlib-dev_1.9.14-2woody2_sparc.deb stable/main/binary-sparc/gdk-imlib-dev_1.9.14-2woody2_sparc.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-s390/gdk-imlib-dev_1.9.14-2woody2_s390.deb stable/main/binary-s390/imlib1_1.9.14-2woody2_s390.deb stable/main/binary-s390/imlib-dev_1.9.14-2woody2_s390.deb stable/main/binary-s390/gdk-imlib1_1.9.14-2woody2_s390.deb stable/main/binary-s390/imlib-progs_1.9.14-2woody2_s390.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-powerpc/gdk-imlib1_1.9.14-2woody2_powerpc.deb stable/main/binary-powerpc/imlib-progs_1.9.14-2woody2_powerpc.deb stable/main/binary-powerpc/gdk-imlib-dev_1.9.14-2woody2_powerpc.deb stable/main/binary-powerpc/imlib-dev_1.9.14-2woody2_powerpc.deb stable/main/binary-powerpc/imlib1_1.9.14-2woody2_powerpc.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-mips/gdk-imlib1_1.9.14-2woody2_mips.deb stable/main/binary-mips/gdk-imlib-dev_1.9.14-2woody2_mips.deb stable/main/binary-mips/imlib1_1.9.14-2woody2_mips.deb stable/main/binary-mips/imlib-dev_1.9.14-2woody2_mips.deb stable/main/binary-mips/imlib-progs_1.9.14-2woody2_mips.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-m68k/gdk-imlib-dev_1.9.14-2woody2_m68k.deb stable/main/binary-m68k/imlib-progs_1.9.14-2woody2_m68k.deb stable/main/binary-m68k/imlib-dev_1.9.14-2woody2_m68k.deb stable/main/binary-m68k/imlib1_1.9.14-2woody2_m68k.deb stable/main/binary-m68k/gdk-imlib1_1.9.14-2woody2_m68k.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-ia64/gdk-imlib-dev_1.9.14-2woody2_ia64.deb stable/main/binary-ia64/imlib-progs_1.9.14-2woody2_ia64.deb stable/main/binary-ia64/imlib1_1.9.14-2woody2_ia64.deb stable/main/binary-ia64/gdk-imlib1_1.9.14-2woody2_ia64.deb stable/main/binary-ia64/imlib-dev_1.9.14-2woody2_ia64.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-i386/imlib-progs_1.9.14-2woody2_i386.deb stable/main/binary-i386/gdk-imlib-dev_1.9.14-2woody2_i386.deb stable/main/binary-i386/imlib1_1.9.14-2woody2_i386.deb stable/main/binary-i386/imlib-dev_1.9.14-2woody2_i386.deb stable/main/binary-i386/gdk-imlib1_1.9.14-2woody2_i386.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-hppa/gdk-imlib-dev_1.9.14-2woody2_hppa.deb stable/main/binary-hppa/imlib-dev_1.9.14-2woody2_hppa.deb stable/main/binary-hppa/gdk-imlib1_1.9.14-2woody2_hppa.deb stable/main/binary-hppa/imlib1_1.9.14-2woody2_hppa.deb stable/main/binary-hppa/imlib-progs_1.9.14-2woody2_hppa.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-arm/imlib1_1.9.14-2woody2_arm.deb stable/main/binary-arm/imlib-dev_1.9.14-2woody2_arm.deb stable/main/binary-arm/gdk-imlib-dev_1.9.14-2woody2_arm.deb stable/main/binary-arm/gdk-imlib1_1.9.14-2woody2_arm.deb stable/main/binary-arm/imlib-progs_1.9.14-2woody2_arm.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-alpha/gdk-imlib-dev_1.9.14-2woody2_alpha.deb stable/main/binary-alpha/imlib-dev_1.9.14-2woody2_alpha.deb stable/main/binary-alpha/imlib-progs_1.9.14-2woody2_alpha.deb stable/main/binary-alpha/imlib1_1.9.14-2woody2_alpha.deb stable/main/binary-alpha/gdk-imlib1_1.9.14-2woody2_alpha.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/source/imlib_1.9.14-2woody2.diff.gz stable/main/source/imlib_1.9.14-2woody2.dsc stable/main/binary-mipsel/gdk-imlib1_1.9.14-2woody2_mipsel.deb stable/main/binary-mipsel/imlib-progs_1.9.14-2woody2_mipsel.deb stable/main/binary-mipsel/gdk-imlib-dev_1.9.14-2woody2_mipsel.deb stable/main/binary-all/imlib-base_1.9.14-2woody2_all.deb stable/main/binary-mipsel/imlib1_1.9.14-2woody2_mipsel.deb stable/main/binary-mipsel/imlib-dev_1.9.14-2woody2_mipsel.deb imlib (1.9.14-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrections to fix multiple heap and integer overflows [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c, gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c, gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026] * Corrected the patch, thanks to Steve Langasek [Imlib/load.c] stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody4_sparc.deb stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody4_sparc.deb stable/main/binary-sparc/libmagick5_5.4.4.5-1woody4_sparc.deb stable/main/binary-sparc/perlmagick_5.4.4.5-1woody4_sparc.deb stable/main/binary-sparc/imagemagick_5.4.4.5-1woody4_sparc.deb stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody4_sparc.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-s390/libmagick++5_5.4.4.5-1woody4_s390.deb stable/main/binary-s390/perlmagick_5.4.4.5-1woody4_s390.deb stable/main/binary-s390/libmagick5_5.4.4.5-1woody4_s390.deb stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody4_s390.deb stable/main/binary-s390/imagemagick_5.4.4.5-1woody4_s390.deb stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody4_s390.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody4_powerpc.deb stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody4_powerpc.deb stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody4_powerpc.deb stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody4_powerpc.deb stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody4_powerpc.deb stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody4_powerpc.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-mips/libmagick++5_5.4.4.5-1woody4_mips.deb stable/main/binary-mips/imagemagick_5.4.4.5-1woody4_mips.deb stable/main/binary-mips/perlmagick_5.4.4.5-1woody4_mips.deb stable/main/binary-mips/libmagick5_5.4.4.5-1woody4_mips.deb stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody4_mips.deb stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody4_mips.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody4_m68k.deb stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody4_m68k.deb stable/main/binary-m68k/libmagick5_5.4.4.5-1woody4_m68k.deb stable/main/binary-m68k/imagemagick_5.4.4.5-1woody4_m68k.deb stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody4_m68k.deb stable/main/binary-m68k/perlmagick_5.4.4.5-1woody4_m68k.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-ia64/imagemagick_5.4.4.5-1woody4_ia64.deb stable/main/binary-ia64/perlmagick_5.4.4.5-1woody4_ia64.deb stable/main/binary-ia64/libmagick5_5.4.4.5-1woody4_ia64.deb stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody4_ia64.deb stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody4_ia64.deb stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody4_ia64.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-i386/perlmagick_5.4.4.5-1woody4_i386.deb stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody4_i386.deb stable/main/binary-i386/libmagick++5_5.4.4.5-1woody4_i386.deb stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody4_i386.deb stable/main/binary-i386/libmagick5_5.4.4.5-1woody4_i386.deb stable/main/binary-i386/imagemagick_5.4.4.5-1woody4_i386.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-hppa/imagemagick_5.4.4.5-1woody4_hppa.deb stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody4_hppa.deb stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody4_hppa.deb stable/main/binary-hppa/libmagick5_5.4.4.5-1woody4_hppa.deb stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody4_hppa.deb stable/main/binary-hppa/perlmagick_5.4.4.5-1woody4_hppa.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody4_arm.deb stable/main/binary-arm/libmagick++5_5.4.4.5-1woody4_arm.deb stable/main/binary-arm/libmagick5_5.4.4.5-1woody4_arm.deb stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody4_arm.deb stable/main/binary-arm/imagemagick_5.4.4.5-1woody4_arm.deb stable/main/binary-arm/perlmagick_5.4.4.5-1woody4_arm.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody4_alpha.deb stable/main/binary-alpha/perlmagick_5.4.4.5-1woody4_alpha.deb stable/main/binary-alpha/imagemagick_5.4.4.5-1woody4_alpha.deb stable/main/binary-alpha/libmagick5_5.4.4.5-1woody4_alpha.deb stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody4_alpha.deb stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody4_alpha.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody4_mipsel.deb stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody4_mipsel.deb stable/main/source/imagemagick_5.4.4.5-1woody4.dsc stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody4_mipsel.deb stable/main/source/imagemagick_5.4.4.5-1woody4.diff.gz stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody4_mipsel.deb stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody4_mipsel.deb stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody4_mipsel.deb imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch to fix arbitrary code execution [magick/attribute.c, CAN-2004-0981, Bug#278401) stable/main/binary-sparc/htget_0.93-1.1woody1_sparc.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-s390/htget_0.93-1.1woody1_s390.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-powerpc/htget_0.93-1.1woody1_powerpc.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-mips/htget_0.93-1.1woody1_mips.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-m68k/htget_0.93-1.1woody1_m68k.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-ia64/htget_0.93-1.1woody1_ia64.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-i386/htget_0.93-1.1woody1_i386.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-hppa/htget_0.93-1.1woody1_hppa.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-arm/htget_0.93-1.1woody1_arm.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-alpha/htget_0.93-1.1woody1_alpha.deb htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-mipsel/htget_0.93-1.1woody1_mipsel.deb stable/main/source/htget_0.93-1.1woody1.dsc stable/main/source/htget_0.93-1.1woody1.tar.gz htget (0.93-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correctly limit reads from network to prevent remotely triggerable buffer overflow. [htget.c CAN-2004-0852] stable/main/binary-sparc/hpsockd_0.6.woody1_sparc.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-s390/hpsockd_0.6.woody1_s390.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-powerpc/hpsockd_0.6.woody1_powerpc.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-mips/hpsockd_0.6.woody1_mips.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-m68k/hpsockd_0.6.woody1_m68k.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-ia64/hpsockd_0.6.woody1_ia64.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-i386/hpsockd_0.6.woody1_i386.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-hppa/hpsockd_0.6.woody1_hppa.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-arm/hpsockd_0.6.woody1_arm.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-alpha/hpsockd_0.6.woody1_alpha.deb hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-mipsel/hpsockd_0.6.woody1_mipsel.deb stable/main/source/hpsockd_0.6.woody1.dsc stable/main/source/hpsockd_0.6.woody1.tar.gz hpsockd (0.6.woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to mitigate denial of service [src/sockd/v5udp.c, CAN-2004-0993] stable/main/binary-sparc/gzip_1.3.2-3woody3_sparc.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-s390/gzip_1.3.2-3woody3_s390.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-powerpc/gzip_1.3.2-3woody3_powerpc.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-mips/gzip_1.3.2-3woody3_mips.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-m68k/gzip_1.3.2-3woody3_m68k.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-ia64/gzip_1.3.2-3woody3_ia64.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-i386/gzip_1.3.2-3woody3_i386.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-hppa/gzip_1.3.2-3woody3_hppa.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-arm/gzip_1.3.2-3woody3_arm.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-alpha/gzip_1.3.2-3woody3_alpha.deb gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/source/gzip_1.3.2-3woody3.dsc stable/main/binary-mipsel/gzip_1.3.2-3woody3_mipsel.deb stable/main/source/gzip_1.3.2-3woody3.diff.gz gzip (1.3.2-3woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Revert patches for zdiff and znew since the use of 'set -C' should indeed be sufficient. stable/main/binary-sparc/gps_0.9.4-1.woody2_sparc.deb stable/main/binary-sparc/rgpsp_0.9.4-1.woody2_sparc.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-s390/rgpsp_0.9.4-1.woody2_s390.deb stable/main/binary-s390/gps_0.9.4-1.woody2_s390.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-powerpc/rgpsp_0.9.4-1.woody2_powerpc.deb stable/main/binary-powerpc/gps_0.9.4-1.woody2_powerpc.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-mips/rgpsp_0.9.4-1.woody2_mips.deb stable/main/binary-mips/gps_0.9.4-1.woody2_mips.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-m68k/gps_0.9.4-1.woody2_m68k.deb stable/main/binary-m68k/rgpsp_0.9.4-1.woody2_m68k.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-ia64/rgpsp_0.9.4-1.woody2_ia64.deb stable/main/binary-ia64/gps_0.9.4-1.woody2_ia64.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-i386/gps_0.9.4-1.woody2_i386.deb stable/main/binary-i386/rgpsp_0.9.4-1.woody2_i386.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-hppa/rgpsp_0.9.4-1.woody2_hppa.deb stable/main/binary-hppa/gps_0.9.4-1.woody2_hppa.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-arm/rgpsp_0.9.4-1.woody2_arm.deb stable/main/binary-arm/gps_0.9.4-1.woody2_arm.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-alpha/rgpsp_0.9.4-1.woody2_alpha.deb stable/main/binary-alpha/gps_0.9.4-1.woody2_alpha.deb gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-mipsel/rgpsp_0.9.4-1.woody2_mipsel.deb stable/main/source/gps_0.9.4-1.woody2.diff.gz stable/main/binary-mipsel/gps_0.9.4-1.woody2_mipsel.deb stable/main/source/gps_0.9.4-1.woody2.dsc gps (0.9.4-1.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted teh version number so that it is higher than 0.9.4-1woody1 and 0.49.13-15.0.1 which prevents the inclusion in stable stable/main/binary-sparc/gnats_3.999.beta1+cvs20020303-2_sparc.deb stable/main/binary-sparc/gnats-user_3.999.beta1+cvs20020303-2_sparc.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/gnats-user_3.999.beta1+cvs20020303-2_s390.deb stable/main/binary-s390/gnats_3.999.beta1+cvs20020303-2_s390.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/gnats-user_3.999.beta1+cvs20020303-2_powerpc.deb stable/main/binary-powerpc/gnats_3.999.beta1+cvs20020303-2_powerpc.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/gnats-user_3.999.beta1+cvs20020303-2_mips.deb stable/main/binary-mips/gnats_3.999.beta1+cvs20020303-2_mips.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/gnats_3.999.beta1+cvs20020303-2_m68k.deb stable/main/binary-m68k/gnats-user_3.999.beta1+cvs20020303-2_m68k.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/gnats-user_3.999.beta1+cvs20020303-2_ia64.deb stable/main/binary-ia64/gnats_3.999.beta1+cvs20020303-2_ia64.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/gnats_3.999.beta1+cvs20020303-2_i386.deb stable/main/binary-i386/gnats-user_3.999.beta1+cvs20020303-2_i386.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/gnats-user_3.999.beta1+cvs20020303-2_hppa.deb stable/main/binary-hppa/gnats_3.999.beta1+cvs20020303-2_hppa.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/gnats-user_3.999.beta1+cvs20020303-2_arm.deb stable/main/binary-arm/gnats_3.999.beta1+cvs20020303-2_arm.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/gnats-user_3.999.beta1+cvs20020303-2_alpha.deb stable/main/binary-alpha/gnats_3.999.beta1+cvs20020303-2_alpha.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/gnats_3.999.beta1+cvs20020303-2_mipsel.deb stable/main/source/gnats_3.999.beta1+cvs20020303-2.dsc stable/main/source/gnats_3.999.beta1+cvs20020303-2.tar.gz stable/main/binary-mipsel/gnats-user_3.999.beta1+cvs20020303-2_mipsel.deb gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high * CAN-2004-0623: Fix format string vulnerability in misc.c (Related BTS: #278577) Report and patch by Joey Hess. * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/fte-console_0.49.13-15.woody2_sparc.deb stable/main/binary-sparc/fte-xwindow_0.49.13-15.woody2_sparc.deb stable/main/binary-sparc/fte-terminal_0.49.13-15.woody2_sparc.deb stable/main/binary-sparc/fte-docs_0.49.13-15.woody2_sparc.deb stable/main/binary-sparc/fte_0.49.13-15.woody2_sparc.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-s390/fte-console_0.49.13-15.woody2_s390.deb stable/main/binary-s390/fte-xwindow_0.49.13-15.woody2_s390.deb stable/main/binary-s390/fte-docs_0.49.13-15.woody2_s390.deb stable/main/binary-s390/fte_0.49.13-15.woody2_s390.deb stable/main/binary-s390/fte-terminal_0.49.13-15.woody2_s390.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-powerpc/fte_0.49.13-15.woody2_powerpc.deb stable/main/binary-powerpc/fte-terminal_0.49.13-15.woody2_powerpc.deb stable/main/binary-powerpc/fte-console_0.49.13-15.woody2_powerpc.deb stable/main/binary-powerpc/fte-docs_0.49.13-15.woody2_powerpc.deb stable/main/binary-powerpc/fte-xwindow_0.49.13-15.woody2_powerpc.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-mips/fte_0.49.13-15.woody2_mips.deb stable/main/binary-mips/fte-terminal_0.49.13-15.woody2_mips.deb stable/main/binary-mips/fte-docs_0.49.13-15.woody2_mips.deb stable/main/binary-mips/fte-console_0.49.13-15.woody2_mips.deb stable/main/binary-mips/fte-xwindow_0.49.13-15.woody2_mips.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-m68k/fte-docs_0.49.13-15.woody2_m68k.deb stable/main/binary-m68k/fte-terminal_0.49.13-15.woody2_m68k.deb stable/main/binary-m68k/fte_0.49.13-15.woody2_m68k.deb stable/main/binary-m68k/fte-xwindow_0.49.13-15.woody2_m68k.deb stable/main/binary-m68k/fte-console_0.49.13-15.woody2_m68k.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-ia64/fte-console_0.49.13-15.woody2_ia64.deb stable/main/binary-ia64/fte-xwindow_0.49.13-15.woody2_ia64.deb stable/main/binary-ia64/fte_0.49.13-15.woody2_ia64.deb stable/main/binary-ia64/fte-docs_0.49.13-15.woody2_ia64.deb stable/main/binary-ia64/fte-terminal_0.49.13-15.woody2_ia64.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-i386/fte-terminal_0.49.13-15.woody2_i386.deb stable/main/binary-i386/fte-xwindow_0.49.13-15.woody2_i386.deb stable/main/binary-i386/fte-console_0.49.13-15.woody2_i386.deb stable/main/binary-i386/fte-docs_0.49.13-15.woody2_i386.deb stable/main/binary-i386/fte_0.49.13-15.woody2_i386.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-hppa/fte-console_0.49.13-15.woody2_hppa.deb stable/main/binary-hppa/fte-docs_0.49.13-15.woody2_hppa.deb stable/main/binary-hppa/fte_0.49.13-15.woody2_hppa.deb stable/main/binary-hppa/fte-xwindow_0.49.13-15.woody2_hppa.deb stable/main/binary-hppa/fte-terminal_0.49.13-15.woody2_hppa.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-arm/fte-xwindow_0.49.13-15.woody2_arm.deb stable/main/binary-arm/fte-console_0.49.13-15.woody2_arm.deb stable/main/binary-arm/fte-docs_0.49.13-15.woody2_arm.deb stable/main/binary-arm/fte_0.49.13-15.woody2_arm.deb stable/main/binary-arm/fte-terminal_0.49.13-15.woody2_arm.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-alpha/fte-terminal_0.49.13-15.woody2_alpha.deb stable/main/binary-alpha/fte-console_0.49.13-15.woody2_alpha.deb stable/main/binary-alpha/fte-xwindow_0.49.13-15.woody2_alpha.deb stable/main/binary-alpha/fte_0.49.13-15.woody2_alpha.deb stable/main/binary-alpha/fte-docs_0.49.13-15.woody2_alpha.deb fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-mipsel/fte-console_0.49.13-15.woody2_mipsel.deb stable/main/binary-mipsel/fte-terminal_0.49.13-15.woody2_mipsel.deb stable/main/binary-mipsel/fte-docs_0.49.13-15.woody2_mipsel.deb stable/main/binary-mipsel/fte-xwindow_0.49.13-15.woody2_mipsel.deb stable/main/binary-mipsel/fte_0.49.13-15.woody2_mipsel.deb stable/main/source/fte_0.49.13-15.woody2.dsc stable/main/source/fte_0.49.13-15.woody2.tar.gz fte (0.49.13-15.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted the version number so that it is higher than 0.49.13-15woody1 and 0.49.13-15.0.1 [CAN-2003-0648] stable/main/binary-sparc/freesweep_0.88-4woody1_sparc.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-s390/freesweep_0.88-4woody1_s390.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-powerpc/freesweep_0.88-4woody1_powerpc.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-mipsel/freesweep_0.88-4woody1_mipsel.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-mips/freesweep_0.88-4woody1_mips.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-m68k/freesweep_0.88-4woody1_m68k.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-ia64/freesweep_0.88-4woody1_ia64.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-hppa/freesweep_0.88-4woody1_hppa.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-arm/freesweep_0.88-4woody1_arm.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-alpha/freesweep_0.88-4woody1_alpha.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/source/freesweep_0.88-4woody1.dsc stable/main/source/freesweep_0.88-4woody1.diff.gz stable/main/binary-i386/freesweep_0.88-4woody1_i386.deb freesweep (0.88-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed buffer overflow with environmental variable handling which allowed local GID games attack (CAN-2003-0828). stable/main/binary-sparc/libfreeamp-alsa_2.1.1.0-4woody2_sparc.deb stable/main/binary-sparc/freeamp-extras_2.1.1.0-4woody2_sparc.deb stable/main/binary-sparc/libfreeamp-esound_2.1.1.0-4woody2_sparc.deb stable/main/binary-sparc/freeamp_2.1.1.0-4woody2_sparc.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-s390/freeamp_2.1.1.0-4woody2_s390.deb stable/main/binary-s390/libfreeamp-esound_2.1.1.0-4woody2_s390.deb stable/main/binary-s390/freeamp-extras_2.1.1.0-4woody2_s390.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-powerpc/libfreeamp-alsa_2.1.1.0-4woody2_powerpc.deb stable/main/binary-powerpc/freeamp_2.1.1.0-4woody2_powerpc.deb stable/main/binary-powerpc/freeamp-extras_2.1.1.0-4woody2_powerpc.deb stable/main/binary-powerpc/libfreeamp-esound_2.1.1.0-4woody2_powerpc.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-mipsel/libfreeamp-esound_2.1.1.0-4woody2_mipsel.deb stable/main/binary-mipsel/freeamp-extras_2.1.1.0-4woody2_mipsel.deb stable/main/binary-mipsel/freeamp_2.1.1.0-4woody2_mipsel.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-mips/freeamp-extras_2.1.1.0-4woody2_mips.deb stable/main/binary-mips/libfreeamp-esound_2.1.1.0-4woody2_mips.deb stable/main/binary-mips/freeamp_2.1.1.0-4woody2_mips.deb stable/main/binary-mips/libfreeamp-alsa_2.1.1.0-4woody2_mips.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-ia64/freeamp_2.1.1.0-4woody2_ia64.deb stable/main/binary-ia64/freeamp-extras_2.1.1.0-4woody2_ia64.deb stable/main/binary-ia64/libfreeamp-esound_2.1.1.0-4woody2_ia64.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-i386/libfreeamp-alsa_2.1.1.0-4woody2_i386.deb stable/main/binary-i386/freeamp_2.1.1.0-4woody2_i386.deb stable/main/binary-i386/libfreeamp-esound_2.1.1.0-4woody2_i386.deb stable/main/binary-i386/freeamp-extras_2.1.1.0-4woody2_i386.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-hppa/freeamp_2.1.1.0-4woody2_hppa.deb stable/main/binary-hppa/freeamp-extras_2.1.1.0-4woody2_hppa.deb stable/main/binary-hppa/libfreeamp-esound_2.1.1.0-4woody2_hppa.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-arm/libfreeamp-esound_2.1.1.0-4woody2_arm.deb stable/main/binary-arm/freeamp_2.1.1.0-4woody2_arm.deb stable/main/binary-arm/freeamp-extras_2.1.1.0-4woody2_arm.deb stable/main/binary-arm/libfreeamp-alsa_2.1.1.0-4woody2_arm.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-alpha/freeamp_2.1.1.0-4woody2_alpha.deb stable/main/binary-alpha/freeamp-extras_2.1.1.0-4woody2_alpha.deb stable/main/binary-alpha/libfreeamp-esound_2.1.1.0-4woody2_alpha.deb stable/main/binary-alpha/libfreeamp-alsa_2.1.1.0-4woody2_alpha.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-m68k/libfreeamp-esound_2.1.1.0-4woody2_m68k.deb stable/main/binary-m68k/freeamp-extras_2.1.1.0-4woody2_m68k.deb stable/main/source/freeamp_2.1.1.0-4woody2.diff.gz stable/main/binary-all/freeamp-doc_2.1.1.0-4woody2_all.deb stable/main/source/freeamp_2.1.1.0-4woody2.dsc stable/main/binary-m68k/freeamp_2.1.1.0-4woody2_m68k.deb freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added Build-Conflicts against libarts-dev so that the package build won't fail anymore if there is a spurious libarts-dev installed by accident. stable/main/binary-sparc/ez-ipupdate_3.0.11b5-1woody2_sparc.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-s390/ez-ipupdate_3.0.11b5-1woody2_s390.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-powerpc/ez-ipupdate_3.0.11b5-1woody2_powerpc.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-mips/ez-ipupdate_3.0.11b5-1woody2_mips.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-m68k/ez-ipupdate_3.0.11b5-1woody2_m68k.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-ia64/ez-ipupdate_3.0.11b5-1woody2_ia64.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-i386/ez-ipupdate_3.0.11b5-1woody2_i386.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-hppa/ez-ipupdate_3.0.11b5-1woody2_hppa.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-arm/ez-ipupdate_3.0.11b5-1woody2_arm.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-alpha/ez-ipupdate_3.0.11b5-1woody2_alpha.deb ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/source/ez-ipupdate_3.0.11b5-1woody2.diff.gz stable/main/binary-mipsel/ez-ipupdate_3.0.11b5-1woody2_mipsel.deb stable/main/source/ez-ipupdate_3.0.11b5-1woody2.dsc ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [ez-ipupdate.c, CAN-2004-0980] stable/main/binary-sparc/tethereal_0.9.4-1woody9_sparc.deb stable/main/binary-sparc/ethereal-dev_0.9.4-1woody9_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody9_sparc.deb stable/main/binary-sparc/ethereal_0.9.4-1woody9_sparc.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-s390/ethereal-dev_0.9.4-1woody9_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody9_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody9_s390.deb stable/main/binary-s390/ethereal-common_0.9.4-1woody9_s390.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-powerpc/ethereal-common_0.9.4-1woody9_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody9_powerpc.deb stable/main/binary-powerpc/ethereal_0.9.4-1woody9_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody9_powerpc.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-mipsel/ethereal-common_0.9.4-1woody9_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody9_mipsel.deb stable/main/binary-mipsel/tethereal_0.9.4-1woody9_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody9_mipsel.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-mips/ethereal-common_0.9.4-1woody9_mips.deb stable/main/binary-mips/ethereal-dev_0.9.4-1woody9_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody9_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody9_mips.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-m68k/ethereal-common_0.9.4-1woody9_m68k.deb stable/main/binary-m68k/ethereal_0.9.4-1woody9_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody9_m68k.deb stable/main/binary-m68k/ethereal-dev_0.9.4-1woody9_m68k.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-ia64/ethereal-common_0.9.4-1woody9_ia64.deb stable/main/binary-ia64/tethereal_0.9.4-1woody9_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody9_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody9_ia64.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-hppa/tethereal_0.9.4-1woody9_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody9_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody9_hppa.deb stable/main/binary-hppa/ethereal-common_0.9.4-1woody9_hppa.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-arm/ethereal_0.9.4-1woody9_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody9_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody9_arm.deb stable/main/binary-arm/ethereal-common_0.9.4-1woody9_arm.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-alpha/ethereal_0.9.4-1woody9_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody9_alpha.deb stable/main/binary-alpha/ethereal-dev_0.9.4-1woody9_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody9_alpha.deb ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-i386/tethereal_0.9.4-1woody9_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody9_i386.deb stable/main/source/ethereal_0.9.4-1woody9.dsc stable/main/binary-i386/ethereal_0.9.4-1woody9_i386.deb stable/main/binary-i386/ethereal-common_0.9.4-1woody9_i386.deb stable/main/source/ethereal_0.9.4-1woody9.diff.gz ethereal (0.9.4-1woody9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SMB dissector (CAN-2004-1142) stable/main/binary-sparc/dhcp-client-udeb_2.0pl5-11woody1_sparc.udeb stable/main/binary-sparc/dhcp-client_2.0pl5-11woody1_sparc.deb stable/main/binary-sparc/dhcp_2.0pl5-11woody1_sparc.deb stable/main/binary-sparc/dhcp-relay_2.0pl5-11woody1_sparc.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-s390/dhcp_2.0pl5-11woody1_s390.deb stable/main/binary-s390/dhcp-client-udeb_2.0pl5-11woody1_s390.udeb stable/main/binary-s390/dhcp-relay_2.0pl5-11woody1_s390.deb stable/main/binary-s390/dhcp-client_2.0pl5-11woody1_s390.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-powerpc/dhcp_2.0pl5-11woody1_powerpc.deb stable/main/binary-powerpc/dhcp-client-udeb_2.0pl5-11woody1_powerpc.udeb stable/main/binary-powerpc/dhcp-client_2.0pl5-11woody1_powerpc.deb stable/main/binary-powerpc/dhcp-relay_2.0pl5-11woody1_powerpc.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-mips/dhcp_2.0pl5-11woody1_mips.deb stable/main/binary-mips/dhcp-client-udeb_2.0pl5-11woody1_mips.udeb stable/main/binary-mips/dhcp-client_2.0pl5-11woody1_mips.deb stable/main/binary-mips/dhcp-relay_2.0pl5-11woody1_mips.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-m68k/dhcp-client_2.0pl5-11woody1_m68k.deb stable/main/binary-m68k/dhcp_2.0pl5-11woody1_m68k.deb stable/main/binary-m68k/dhcp-client-udeb_2.0pl5-11woody1_m68k.udeb stable/main/binary-m68k/dhcp-relay_2.0pl5-11woody1_m68k.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-ia64/dhcp_2.0pl5-11woody1_ia64.deb stable/main/binary-ia64/dhcp-client_2.0pl5-11woody1_ia64.deb stable/main/binary-ia64/dhcp-client-udeb_2.0pl5-11woody1_ia64.udeb stable/main/binary-ia64/dhcp-relay_2.0pl5-11woody1_ia64.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-i386/dhcp-client-udeb_2.0pl5-11woody1_i386.udeb stable/main/binary-i386/dhcp-relay_2.0pl5-11woody1_i386.deb stable/main/binary-i386/dhcp-client_2.0pl5-11woody1_i386.deb stable/main/binary-i386/dhcp_2.0pl5-11woody1_i386.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-hppa/dhcp-client-udeb_2.0pl5-11woody1_hppa.udeb stable/main/binary-hppa/dhcp-relay_2.0pl5-11woody1_hppa.deb stable/main/binary-hppa/dhcp-client_2.0pl5-11woody1_hppa.deb stable/main/binary-hppa/dhcp_2.0pl5-11woody1_hppa.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-arm/dhcp-relay_2.0pl5-11woody1_arm.deb stable/main/binary-arm/dhcp-client-udeb_2.0pl5-11woody1_arm.udeb stable/main/binary-arm/dhcp-client_2.0pl5-11woody1_arm.deb stable/main/binary-arm/dhcp_2.0pl5-11woody1_arm.deb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-alpha/dhcp-relay_2.0pl5-11woody1_alpha.deb stable/main/binary-alpha/dhcp_2.0pl5-11woody1_alpha.deb stable/main/binary-alpha/dhcp-client_2.0pl5-11woody1_alpha.deb stable/main/binary-alpha/dhcp-client-udeb_2.0pl5-11woody1_alpha.udeb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/binary-mipsel/dhcp-relay_2.0pl5-11woody1_mipsel.deb stable/main/binary-mipsel/dhcp-client_2.0pl5-11woody1_mipsel.deb stable/main/source/dhcp_2.0pl5-11woody1.dsc stable/main/source/dhcp_2.0pl5-11woody1.diff.gz stable/main/binary-mipsel/dhcp_2.0pl5-11woody1_mipsel.deb stable/main/binary-mipsel/dhcp-client-udeb_2.0pl5-11woody1_mipsel.udeb dhcp (2.0pl5-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected calls to syslog() in order to prevent a remotely triggerable buffer overflow [common/errwarn.c, CAN-2004-1006] stable/main/source/debmake_3.6.10.woody.1.dsc stable/main/binary-all/debmake_3.6.10.woody.1_all.deb stable/main/source/debmake_3.6.10.woody.1.tar.gz debmake (3.6.10.woody.1) stable-security; urgency=medium * Fixed insecure temporary directory usage in debstd (Bug #286382). Applied fix from debmake_3.7.7. stable/main/binary-sparc/cyrus-imapd_1.5.19-9.2_sparc.deb stable/main/binary-sparc/cyrus-common_1.5.19-9.2_sparc.deb stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.2_sparc.deb stable/main/binary-sparc/cyrus-dev_1.5.19-9.2_sparc.deb stable/main/binary-sparc/cyrus-admin_1.5.19-9.2_sparc.deb stable/main/binary-sparc/cyrus-nntp_1.5.19-9.2_sparc.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-s390/cyrus-admin_1.5.19-9.2_s390.deb stable/main/binary-s390/cyrus-dev_1.5.19-9.2_s390.deb stable/main/binary-s390/cyrus-common_1.5.19-9.2_s390.deb stable/main/binary-s390/cyrus-pop3d_1.5.19-9.2_s390.deb stable/main/binary-s390/cyrus-imapd_1.5.19-9.2_s390.deb stable/main/binary-s390/cyrus-nntp_1.5.19-9.2_s390.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.2_powerpc.deb stable/main/binary-powerpc/cyrus-common_1.5.19-9.2_powerpc.deb stable/main/binary-powerpc/cyrus-dev_1.5.19-9.2_powerpc.deb stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.2_powerpc.deb stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.2_powerpc.deb stable/main/binary-powerpc/cyrus-admin_1.5.19-9.2_powerpc.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-mips/cyrus-imapd_1.5.19-9.2_mips.deb stable/main/binary-mips/cyrus-common_1.5.19-9.2_mips.deb stable/main/binary-mips/cyrus-admin_1.5.19-9.2_mips.deb stable/main/binary-mips/cyrus-pop3d_1.5.19-9.2_mips.deb stable/main/binary-mips/cyrus-nntp_1.5.19-9.2_mips.deb stable/main/binary-mips/cyrus-dev_1.5.19-9.2_mips.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-m68k/cyrus-common_1.5.19-9.2_m68k.deb stable/main/binary-m68k/cyrus-imapd_1.5.19-9.2_m68k.deb stable/main/binary-m68k/cyrus-nntp_1.5.19-9.2_m68k.deb stable/main/binary-m68k/cyrus-admin_1.5.19-9.2_m68k.deb stable/main/binary-m68k/cyrus-dev_1.5.19-9.2_m68k.deb stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.2_m68k.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-ia64/cyrus-common_1.5.19-9.2_ia64.deb stable/main/binary-ia64/cyrus-nntp_1.5.19-9.2_ia64.deb stable/main/binary-ia64/cyrus-admin_1.5.19-9.2_ia64.deb stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.2_ia64.deb stable/main/binary-ia64/cyrus-imapd_1.5.19-9.2_ia64.deb stable/main/binary-ia64/cyrus-dev_1.5.19-9.2_ia64.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-i386/cyrus-dev_1.5.19-9.2_i386.deb stable/main/binary-i386/cyrus-pop3d_1.5.19-9.2_i386.deb stable/main/binary-i386/cyrus-imapd_1.5.19-9.2_i386.deb stable/main/binary-i386/cyrus-nntp_1.5.19-9.2_i386.deb stable/main/binary-i386/cyrus-admin_1.5.19-9.2_i386.deb stable/main/binary-i386/cyrus-common_1.5.19-9.2_i386.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-hppa/cyrus-nntp_1.5.19-9.2_hppa.deb stable/main/binary-hppa/cyrus-dev_1.5.19-9.2_hppa.deb stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.2_hppa.deb stable/main/binary-hppa/cyrus-common_1.5.19-9.2_hppa.deb stable/main/binary-hppa/cyrus-admin_1.5.19-9.2_hppa.deb stable/main/binary-hppa/cyrus-imapd_1.5.19-9.2_hppa.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-arm/cyrus-dev_1.5.19-9.2_arm.deb stable/main/binary-arm/cyrus-pop3d_1.5.19-9.2_arm.deb stable/main/binary-arm/cyrus-common_1.5.19-9.2_arm.deb stable/main/binary-arm/cyrus-nntp_1.5.19-9.2_arm.deb stable/main/binary-arm/cyrus-admin_1.5.19-9.2_arm.deb stable/main/binary-arm/cyrus-imapd_1.5.19-9.2_arm.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-alpha/cyrus-admin_1.5.19-9.2_alpha.deb stable/main/binary-alpha/cyrus-dev_1.5.19-9.2_alpha.deb stable/main/binary-alpha/cyrus-imapd_1.5.19-9.2_alpha.deb stable/main/binary-alpha/cyrus-common_1.5.19-9.2_alpha.deb stable/main/binary-alpha/cyrus-nntp_1.5.19-9.2_alpha.deb stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.2_alpha.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-mipsel/cyrus-dev_1.5.19-9.2_mipsel.deb stable/main/source/cyrus-imapd_1.5.19-9.2.diff.gz stable/main/binary-mipsel/cyrus-admin_1.5.19-9.2_mipsel.deb stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.2_mipsel.deb stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.2_mipsel.deb stable/main/source/cyrus-imapd_1.5.19-9.2.dsc stable/main/binary-mipsel/cyrus-common_1.5.19-9.2_mipsel.deb stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.2_mipsel.deb cyrus-imapd (1.5.19-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Partially applied patch from Sebastian Krahmer to prevent buffer overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013] stable/main/binary-sparc/cscope_15.3-1woody2_sparc.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-s390/cscope_15.3-1woody2_s390.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-powerpc/cscope_15.3-1woody2_powerpc.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-mips/cscope_15.3-1woody2_mips.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-m68k/cscope_15.3-1woody2_m68k.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-ia64/cscope_15.3-1woody2_ia64.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-i386/cscope_15.3-1woody2_i386.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-hppa/cscope_15.3-1woody2_hppa.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-arm/cscope_15.3-1woody2_arm.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-alpha/cscope_15.3-1woody2_alpha.deb cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-mipsel/cscope_15.3-1woody2_mipsel.deb stable/main/source/cscope_15.3-1woody2.dsc stable/main/source/cscope_15.3-1woody2.diff.gz cscope (15.3-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary file creation [src/main.c, CAN-2004-0996] stable/main/binary-sparc/catdoc_0.91.5-1.woody3_sparc.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-s390/catdoc_0.91.5-1.woody3_s390.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-powerpc/catdoc_0.91.5-1.woody3_powerpc.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-mips/catdoc_0.91.5-1.woody3_mips.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-m68k/catdoc_0.91.5-1.woody3_m68k.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-ia64/catdoc_0.91.5-1.woody3_ia64.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-i386/catdoc_0.91.5-1.woody3_i386.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-hppa/catdoc_0.91.5-1.woody3_hppa.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-alpha/catdoc_0.91.5-1.woody3_alpha.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/source/catdoc_0.91.5-1.woody3.diff.gz stable/main/source/catdoc_0.91.5-1.woody3.dsc stable/main/binary-mipsel/catdoc_0.91.5-1.woody3_mipsel.deb catdoc (0.91.5-1.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuilt to contain a version number higher than 0.91.5-1woody1 and 0.91.5-1.99woody.1 which prevents the security update to be accepted. * Fix msxlsview to create its temporary file securely using tempfile(1) [src/msxlsview.sh, CAN-2003-0193] * Adjusted dependency to wish to tk8.2 so that there is only a single package to depend on. stable/main/binary-sparc/cabextract_0.2-2b_sparc.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-s390/cabextract_0.2-2b_s390.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-powerpc/cabextract_0.2-2b_powerpc.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-mipsel/cabextract_0.2-2b_mipsel.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-mips/cabextract_0.2-2b_mips.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-m68k/cabextract_0.2-2b_m68k.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-ia64/cabextract_0.2-2b_ia64.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-hppa/cabextract_0.2-2b_hppa.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-arm/cabextract_0.2-2b_arm.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-alpha/cabextract_0.2-2b_alpha.deb cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/source/cabextract_0.2-2b.dsc stable/main/binary-i386/cabextract_0.2-2b_i386.deb stable/main/source/cabextract_0.2-2b.diff.gz cabextract (0.2-2b) stable-security; urgency=high * Fix unintended directory traversal security bug [cabextract.c, CAN-2004-0916, Bug#277522] stable/main/binary-sparc/bnc_2.6.4-3.3_sparc.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-s390/bnc_2.6.4-3.3_s390.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-powerpc/bnc_2.6.4-3.3_powerpc.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-mips/bnc_2.6.4-3.3_mips.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-m68k/bnc_2.6.4-3.3_m68k.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-ia64/bnc_2.6.4-3.3_ia64.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-i386/bnc_2.6.4-3.3_i386.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-hppa/bnc_2.6.4-3.3_hppa.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-arm/bnc_2.6.4-3.3_arm.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/binary-alpha/bnc_2.6.4-3.3_alpha.deb bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/main/source/bnc_2.6.4-3.3.diff.gz stable/main/binary-mipsel/bnc_2.6.4-3.3_mipsel.deb stable/main/source/bnc_2.6.4-3.3.dsc bnc (2.6.4-3.3) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Added debhelper as build-dependency so the package can be built by our buildd network. * Incorporated size test for getnickuserhost() to prevent a remote buffer overflow [cmds.c, CAN-2004-1052] stable/contrib/binary-sparc/atari800_1.2.2-1woody3_sparc.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-s390/atari800_1.2.2-1woody3_s390.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-powerpc/atari800_1.2.2-1woody3_powerpc.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-mips/atari800_1.2.2-1woody3_mips.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-m68k/atari800_1.2.2-1woody3_m68k.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-ia64/atari800_1.2.2-1woody3_ia64.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-i386/atari800_1.2.2-1woody3_i386.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-hppa/atari800_1.2.2-1woody3_hppa.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-arm/atari800_1.2.2-1woody3_arm.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/binary-alpha/atari800_1.2.2-1woody3_alpha.deb atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/contrib/source/atari800_1.2.2-1woody3.dsc stable/contrib/binary-mipsel/atari800_1.2.2-1woody3_mipsel.deb stable/contrib/source/atari800_1.2.2-1woody3.diff.gz atari800 (1.2.2-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limitation to prevent the execution of arbitrary code while in privileged mode [src/log.c] * Implemented and utilised strfcpy() to prevent the execution of arbitrary code while reading config statements in privileged mode [src/rt-config.c, CAN-2004-1076] stable/main/binary-sparc/apache-common_1.3.26-0woody6_sparc.deb stable/main/binary-sparc/apache-dev_1.3.26-0woody6_sparc.deb stable/main/binary-sparc/apache_1.3.26-0woody6_sparc.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-s390/apache-common_1.3.26-0woody6_s390.deb stable/main/binary-s390/apache-dev_1.3.26-0woody6_s390.deb stable/main/binary-s390/apache_1.3.26-0woody6_s390.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-powerpc/apache-dev_1.3.26-0woody6_powerpc.deb stable/main/binary-powerpc/apache_1.3.26-0woody6_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.26-0woody6_powerpc.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-mips/apache-dev_1.3.26-0woody6_mips.deb stable/main/binary-mips/apache_1.3.26-0woody6_mips.deb stable/main/binary-mips/apache-common_1.3.26-0woody6_mips.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-m68k/apache-dev_1.3.26-0woody6_m68k.deb stable/main/binary-m68k/apache-common_1.3.26-0woody6_m68k.deb stable/main/binary-m68k/apache_1.3.26-0woody6_m68k.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-ia64/apache-common_1.3.26-0woody6_ia64.deb stable/main/binary-ia64/apache_1.3.26-0woody6_ia64.deb stable/main/binary-ia64/apache-dev_1.3.26-0woody6_ia64.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-i386/apache-common_1.3.26-0woody6_i386.deb stable/main/binary-i386/apache_1.3.26-0woody6_i386.deb stable/main/binary-i386/apache-dev_1.3.26-0woody6_i386.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-hppa/apache-common_1.3.26-0woody6_hppa.deb stable/main/binary-hppa/apache-dev_1.3.26-0woody6_hppa.deb stable/main/binary-hppa/apache_1.3.26-0woody6_hppa.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-arm/apache-common_1.3.26-0woody6_arm.deb stable/main/binary-arm/apache_1.3.26-0woody6_arm.deb stable/main/binary-arm/apache-dev_1.3.26-0woody6_arm.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-alpha/apache-common_1.3.26-0woody6_alpha.deb stable/main/binary-alpha/apache_1.3.26-0woody6_alpha.deb stable/main/binary-alpha/apache-dev_1.3.26-0woody6_alpha.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-mipsel/apache-common_1.3.26-0woody6_mipsel.deb stable/main/binary-mipsel/apache_1.3.26-0woody6_mipsel.deb stable/main/source/apache_1.3.26-0woody6.dsc stable/main/binary-all/apache-doc_1.3.26-0woody6_all.deb stable/main/source/apache_1.3.26-0woody6.diff.gz stable/main/binary-mipsel/apache-dev_1.3.26-0woody6_mipsel.deb apache (1.3.26-0woody6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of user and file supplied data so no overflow can happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd] * Applied upstream patch to fix a buffer overflow in mod_include [debian/patches/x_CAN-2004-0940_mod_include] stable/main/binary-sparc/abiword_1.0.2+cvs.2002.06.05-1woody2_sparc.deb stable/main/binary-sparc/abiword-common_1.0.2+cvs.2002.06.05-1woody2_sparc.deb stable/main/binary-sparc/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_sparc.deb stable/main/binary-sparc/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_sparc.deb stable/main/binary-sparc/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_sparc.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-s390/abiword-common_1.0.2+cvs.2002.06.05-1woody2_s390.deb stable/main/binary-s390/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_s390.deb stable/main/binary-s390/abiword_1.0.2+cvs.2002.06.05-1woody2_s390.deb stable/main/binary-s390/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_s390.deb stable/main/binary-s390/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_s390.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-powerpc/abiword-common_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb stable/main/binary-powerpc/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb stable/main/binary-powerpc/abiword_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb stable/main/binary-powerpc/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb stable/main/binary-powerpc/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-mipsel/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb stable/main/binary-mipsel/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb stable/main/binary-mipsel/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb stable/main/binary-mipsel/abiword-common_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb stable/main/binary-mipsel/abiword_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-mips/abiword-common_1.0.2+cvs.2002.06.05-1woody2_mips.deb stable/main/binary-mips/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_mips.deb stable/main/binary-mips/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_mips.deb stable/main/binary-mips/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_mips.deb stable/main/binary-mips/abiword_1.0.2+cvs.2002.06.05-1woody2_mips.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-m68k/abiword-common_1.0.2+cvs.2002.06.05-1woody2_m68k.deb stable/main/binary-m68k/abiword_1.0.2+cvs.2002.06.05-1woody2_m68k.deb stable/main/binary-m68k/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_m68k.deb stable/main/binary-m68k/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_m68k.deb stable/main/binary-m68k/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_m68k.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-ia64/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_ia64.deb stable/main/binary-ia64/abiword_1.0.2+cvs.2002.06.05-1woody2_ia64.deb stable/main/binary-ia64/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_ia64.deb stable/main/binary-ia64/abiword-common_1.0.2+cvs.2002.06.05-1woody2_ia64.deb stable/main/binary-ia64/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_ia64.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-hppa/abiword-common_1.0.2+cvs.2002.06.05-1woody2_hppa.deb stable/main/binary-hppa/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_hppa.deb stable/main/binary-hppa/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_hppa.deb stable/main/binary-hppa/abiword_1.0.2+cvs.2002.06.05-1woody2_hppa.deb stable/main/binary-hppa/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_hppa.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-arm/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_arm.deb stable/main/binary-arm/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_arm.deb stable/main/binary-arm/abiword_1.0.2+cvs.2002.06.05-1woody2_arm.deb stable/main/binary-arm/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_arm.deb stable/main/binary-arm/abiword-common_1.0.2+cvs.2002.06.05-1woody2_arm.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-alpha/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_alpha.deb stable/main/binary-alpha/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_alpha.deb stable/main/binary-alpha/abiword-common_1.0.2+cvs.2002.06.05-1woody2_alpha.deb stable/main/binary-alpha/abiword_1.0.2+cvs.2002.06.05-1woody2_alpha.deb stable/main/binary-alpha/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_alpha.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/source/abiword_1.0.2+cvs.2002.06.05-1woody2.diff.gz stable/main/source/abiword_1.0.2+cvs.2002.06.05-1woody2.dsc stable/main/binary-i386/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_i386.deb stable/main/binary-all/abiword-doc_1.0.2+cvs.2002.06.05-1woody2_all.deb stable/main/binary-i386/abiword_1.0.2+cvs.2002.06.05-1woody2_i386.deb stable/main/binary-i386/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_i386.deb stable/main/binary-i386/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_i386.deb stable/main/binary-all/xfonts-abi_1.0.2+cvs.2002.06.05-1woody2_all.deb stable/main/binary-i386/abiword-common_1.0.2+cvs.2002.06.05-1woody2_i386.deb abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a datetime field buffer overflow in the wv library [wv/field.c, CAN-2004-0645] stable/main/binary-sparc/a2ps_4.13b-16woody1_sparc.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-s390/a2ps_4.13b-16woody1_s390.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-powerpc/a2ps_4.13b-16woody1_powerpc.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-mipsel/a2ps_4.13b-16woody1_mipsel.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-mips/a2ps_4.13b-16woody1_mips.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-m68k/a2ps_4.13b-16woody1_m68k.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-ia64/a2ps_4.13b-16woody1_ia64.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-hppa/a2ps_4.13b-16woody1_hppa.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-arm/a2ps_4.13b-16woody1_arm.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/binary-alpha/a2ps_4.13b-16woody1_alpha.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it stable/main/source/a2ps_4.13b-16woody1.dsc stable/main/source/a2ps_4.13b-16woody1.diff.gz stable/main/binary-i386/a2ps_4.13b-16woody1_i386.deb a2ps (4.13b-16woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Moritz Muehlenhoff to fix command execution vulnerability [src/select.c, CAN-2004-1170] * Lowered build dependency for emacsen to emacs20 | emacsen so that apt-get can cope with it ========================================= Mon, 25 Oct 2004 - Debian 3.0r3 released ========================================= Removed the following packages from stable: aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc aspell-doc | 0.33.7.1-8 | all aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "Broken package, removed on request of maintainer. (Bug#146326, Bug#164681)" -- gnomesword | 0.5.2c-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "Broken package, removed on request of maintainer. (Bug#146326, Bug#164681)" -- hdate | 2.36-2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "This package contains more than one licence and they stand in conflict with each other. Bug#225537 - http://www.debian.org/devel/wnpp/unable-hdate" -- heyu | 1.33-3 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The copyright clearly indicates that the package is non-free. Hence, removed due to the license." -- kernel-patch-2.4.0-ia64 | 010125-1 | source, all kernel-patch-2.4.0-reiserfs | 3.6.25-4 | source, all kernel-patch-2.4.1-ia64 | 010131-3 | source, all (Reason: as requested by Stable Release Manager) "This package became unusable. Needs kernel-source-2.4.{0,1}, which doesn't exist. (Bug#184524)" -- pcmcia-modules-2.2.22 | 3.1.33-6k1 | i386 pcmcia-modules-2.2.22-compact | 3.1.33-6k1 | i386 pcmcia-modules-2.2.22-idepci | 3.1.33-6k1 | i386 (Reason: as requested by Stable Release Manager) "Unsatisfiable Depends: kernel-image-2.2.22 (= 2.2.22-1)" -- spellcast | 1.0-12 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc spellcast-doc | 1.0 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "This package is non-free, and not going to become free again, so there's no desire to compile it for all architectures and move it into non-free. See Bug#241002." -- ttf-xtt | 0.20010818-5 | source ttf-xtt-wadalab-gothic | 0.20010818-5 | all ttf-xtt-watanabe-mincho | 0.20010818-5 | all ttf-xwatanabe-mincho | 0.2001.1201-1 | source, all watanabe-vfont | 1-9 | source, all (Reason: as requested by Stable Release Manager) "License problems: Bug#214395, Bug#214400, Bug#214587, Bug#214399 http://lists.debian.org/debian-devel/2003/debian-devel-200310/msg00223.html" -- xroach | 4.0-8 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "In Bug#158188 Joey Hess writes: That is not free as it does not allow modificaton, or sale. As I have to modify the package to package it, I think it best it just be removed from debian. I will try to contact the author, if the license if fixed we can add it back. License: This program may be freely distributed provided that all copyright notices are retained. All trials to get in touch with the original author failed." -- stable/main/binary-sparc/zope_2.5.1-1woody1_sparc.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-s390/zope_2.5.1-1woody1_s390.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-powerpc/zope_2.5.1-1woody1_powerpc.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-mipsel/zope_2.5.1-1woody1_mipsel.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-mips/zope_2.5.1-1woody1_mips.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-m68k/zope_2.5.1-1woody1_m68k.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-ia64/zope_2.5.1-1woody1_ia64.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-hppa/zope_2.5.1-1woody1_hppa.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-arm/zope_2.5.1-1woody1_arm.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-alpha/zope_2.5.1-1woody1_alpha.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/source/zope_2.5.1-1woody1.diff.gz stable/main/source/zope_2.5.1-1woody1.dsc stable/main/binary-i386/zope_2.5.1-1woody1_i386.deb zope (2.5.1-1woody1) stable-security; urgency=high * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects). Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert. [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688] stable/main/binary-sparc/zebra_0.92a-5woody2_sparc.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-s390/zebra_0.92a-5woody2_s390.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-powerpc/zebra_0.92a-5woody2_powerpc.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-mipsel/zebra_0.92a-5woody2_mipsel.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-mips/zebra_0.92a-5woody2_mips.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-m68k/zebra_0.92a-5woody2_m68k.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-ia64/zebra_0.92a-5woody2_ia64.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-hppa/zebra_0.92a-5woody2_hppa.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-arm/zebra_0.92a-5woody2_arm.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-alpha/zebra_0.92a-5woody2_alpha.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/source/zebra_0.92a-5woody2.dsc stable/main/source/zebra_0.92a-5woody2.diff.gz stable/main/binary-i386/zebra_0.92a-5woody2_i386.deb stable/main/binary-all/zebra-doc_0.92a-5woody2_all.deb zebra (0.92a-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-sparc/xsok_1.02-9woody2_sparc.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-s390/xsok_1.02-9woody2_s390.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-powerpc/xsok_1.02-9woody2_powerpc.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-mipsel/xsok_1.02-9woody2_mipsel.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-mips/xsok_1.02-9woody2_mips.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-m68k/xsok_1.02-9woody2_m68k.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-ia64/xsok_1.02-9woody2_ia64.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-hppa/xsok_1.02-9woody2_hppa.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-arm/xsok_1.02-9woody2_arm.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-alpha/xsok_1.02-9woody2_alpha.deb xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/source/xsok_1.02-9woody2.diff.gz stable/main/binary-i386/xsok_1.02-9woody2_i386.deb stable/main/source/xsok_1.02-9woody2.dsc xsok (1.02-9woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Drop extra privileges before invoking external commands. (CAN-2003-0949) * Rebuilt so the dependency will be against libaw6 as before. stable/main/binary-sparc/xpcd_2.08-8woody2_sparc.deb stable/main/binary-sparc/xpcd-gimp_2.08-8woody2_sparc.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-s390/xpcd-gimp_2.08-8woody2_s390.deb stable/main/binary-s390/xpcd_2.08-8woody2_s390.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-powerpc/xpcd_2.08-8woody2_powerpc.deb stable/main/binary-powerpc/xpcd-gimp_2.08-8woody2_powerpc.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-mipsel/xpcd_2.08-8woody2_mipsel.deb stable/main/binary-mipsel/xpcd-gimp_2.08-8woody2_mipsel.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-mips/xpcd-gimp_2.08-8woody2_mips.deb stable/main/binary-mips/xpcd_2.08-8woody2_mips.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-m68k/xpcd_2.08-8woody2_m68k.deb stable/main/binary-m68k/xpcd-gimp_2.08-8woody2_m68k.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-ia64/xpcd_2.08-8woody2_ia64.deb stable/main/binary-ia64/xpcd-gimp_2.08-8woody2_ia64.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-hppa/xpcd-gimp_2.08-8woody2_hppa.deb stable/main/binary-hppa/xpcd_2.08-8woody2_hppa.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-arm/xpcd-gimp_2.08-8woody2_arm.deb stable/main/binary-arm/xpcd_2.08-8woody2_arm.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-alpha/xpcd-gimp_2.08-8woody2_alpha.deb stable/main/binary-alpha/xpcd_2.08-8woody2_alpha.deb xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-i386/xpcd-svga_2.08-8woody2_i386.deb stable/main/source/xpcd_2.08-8woody2.dsc stable/main/binary-i386/xpcd_2.08-8woody2_i386.deb stable/main/binary-i386/xpcd-gimp_2.08-8woody2_i386.deb stable/main/source/xpcd_2.08-8woody2.diff.gz xpcd (2.08-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402) stable/main/binary-sparc/xonix_1.4-19woody1_sparc.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-s390/xonix_1.4-19woody1_s390.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-powerpc/xonix_1.4-19woody1_powerpc.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-mipsel/xonix_1.4-19woody1_mipsel.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-mips/xonix_1.4-19woody1_mips.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-m68k/xonix_1.4-19woody1_m68k.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-ia64/xonix_1.4-19woody1_ia64.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-hppa/xonix_1.4-19woody1_hppa.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-arm/xonix_1.4-19woody1_arm.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-alpha/xonix_1.4-19woody1_alpha.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/source/xonix_1.4-19woody1.dsc stable/main/source/xonix_1.4-19woody1.diff.gz stable/main/binary-i386/xonix_1.4-19woody1_i386.deb xonix (1.4-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Drop privileges before invoking external mailer command when highscores are achieved. (CAN-2004-0157) stable/main/binary-sparc/xitalk_1.1.11-9.1woody1_sparc.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-s390/xitalk_1.1.11-9.1woody1_s390.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-powerpc/xitalk_1.1.11-9.1woody1_powerpc.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-mipsel/xitalk_1.1.11-9.1woody1_mipsel.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-mips/xitalk_1.1.11-9.1woody1_mips.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-m68k/xitalk_1.1.11-9.1woody1_m68k.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-ia64/xitalk_1.1.11-9.1woody1_ia64.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-hppa/xitalk_1.1.11-9.1woody1_hppa.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-arm/xitalk_1.1.11-9.1woody1_arm.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-alpha/xitalk_1.1.11-9.1woody1_alpha.deb xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-i386/xitalk_1.1.11-9.1woody1_i386.deb stable/main/source/xitalk_1.1.11-9.1woody1.dsc stable/main/source/xitalk_1.1.11-9.1woody1.diff.gz xitalk (1.1.11-9.1woody1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Drop all privileges before invoking external commands (CAN-2004-0151) stable/main/binary-s390/xine-ui_0.9.8-5.1_s390.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/xine-ui_0.9.8-5.1_powerpc.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/xine-ui_0.9.8-5.1_mipsel.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/xine-ui_0.9.8-5.1_mips.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/xine-ui_0.9.8-5.1_m68k.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/xine-ui_0.9.8-5.1_ia64.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/xine-ui_0.9.8-5.1_i386.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/xine-ui_0.9.8-5.1_hppa.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/xine-ui_0.9.8-5.1_arm.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/xine-ui_0.9.8-5.1_alpha.deb xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/source/xine-ui_0.9.8-5.1.dsc stable/main/binary-sparc/xine-ui_0.9.8-5.1_sparc.deb stable/main/source/xine-ui_0.9.8-5.1.diff.gz xine-ui (0.9.8-5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/xbase-clients_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xdm_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xserver-common_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibs-pic_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libdps1_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xfs_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xmh_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw7_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xvfb_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xfwp_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibmesa3_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xutils_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xterm_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/proxymngr_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibs_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibs-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xprt_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/x-window-system-core_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw6_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/twm_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/libdps-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/lbxproxy_4.1.0-16woody4_sparc.deb stable/main/binary-sparc/xnest_4.1.0-16woody4_sparc.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-s390/xvfb_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibs-dev_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw7-dev_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw6-dev_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody4_s390.deb stable/main/binary-s390/xmh_4.1.0-16woody4_s390.deb stable/main/binary-s390/twm_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw6_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw7_4.1.0-16woody4_s390.deb stable/main/binary-s390/xdm_4.1.0-16woody4_s390.deb stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody4_s390.deb stable/main/binary-s390/libdps1_4.1.0-16woody4_s390.deb stable/main/binary-s390/xterm_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibs_4.1.0-16woody4_s390.deb stable/main/binary-s390/xutils_4.1.0-16woody4_s390.deb stable/main/binary-s390/xnest_4.1.0-16woody4_s390.deb stable/main/binary-s390/xfs_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibmesa3_4.1.0-16woody4_s390.deb stable/main/binary-s390/x-window-system-core_4.1.0-16woody4_s390.deb stable/main/binary-s390/libdps-dev_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibs-pic_4.1.0-16woody4_s390.deb stable/main/binary-s390/xbase-clients_4.1.0-16woody4_s390.deb stable/main/binary-s390/lbxproxy_4.1.0-16woody4_s390.deb stable/main/binary-s390/xlibs-dbg_4.1.0-16woody4_s390.deb stable/main/binary-s390/xserver-common_4.1.0-16woody4_s390.deb stable/main/binary-s390/xfwp_4.1.0-16woody4_s390.deb stable/main/binary-s390/xprt_4.1.0-16woody4_s390.deb stable/main/binary-s390/proxymngr_4.1.0-16woody4_s390.deb stable/main/binary-s390/libdps1-dbg_4.1.0-16woody4_s390.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-mipsel/xbase-clients_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xnest_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw7_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/proxymngr_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xfwp_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xmh_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xfs_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/twm_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xdm_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xserver-common_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libdps1_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xutils_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xvfb_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xprt_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw6_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xterm_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody4_mipsel.deb stable/main/binary-mipsel/xlibs_4.1.0-16woody4_mipsel.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-mips/xvfb_4.1.0-16woody4_mips.deb stable/main/binary-mips/twm_4.1.0-16woody4_mips.deb stable/main/binary-mips/xbase-clients_4.1.0-16woody4_mips.deb stable/main/binary-mips/xprt_4.1.0-16woody4_mips.deb stable/main/binary-mips/xserver-xfree86_4.1.0-16woody4_mips.deb stable/main/binary-mips/lbxproxy_4.1.0-16woody4_mips.deb stable/main/binary-mips/xterm_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibmesa3_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw6-dev_4.1.0-16woody4_mips.deb stable/main/binary-mips/xutils_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw7-dev_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw7_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibs-pic_4.1.0-16woody4_mips.deb stable/main/binary-mips/x-window-system-core_4.1.0-16woody4_mips.deb stable/main/binary-mips/libdps1_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibs-dev_4.1.0-16woody4_mips.deb stable/main/binary-mips/xdm_4.1.0-16woody4_mips.deb stable/main/binary-mips/xnest_4.1.0-16woody4_mips.deb stable/main/binary-mips/xserver-common_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody4_mips.deb stable/main/binary-mips/libdps1-dbg_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody4_mips.deb stable/main/binary-mips/xfs_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibs-dbg_4.1.0-16woody4_mips.deb stable/main/binary-mips/libdps-dev_4.1.0-16woody4_mips.deb stable/main/binary-mips/xfwp_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody4_mips.deb stable/main/binary-mips/xmh_4.1.0-16woody4_mips.deb stable/main/binary-mips/proxymngr_4.1.0-16woody4_mips.deb stable/main/binary-mips/libxaw6_4.1.0-16woody4_mips.deb stable/main/binary-mips/xlibs_4.1.0-16woody4_mips.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xdm_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibs-dev_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw7_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xutils_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xfwp_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/x-window-system-core_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libdps-dev_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xfs_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xbase-clients_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw6_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xserver-common_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xprt_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xnest_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/proxymngr_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xmh_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/lbxproxy_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibmesa3_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/libdps1_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibs-pic_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xterm_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xlibs_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/twm_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xvfb_4.1.0-16woody4_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody4_m68k.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-ia64/lbxproxy_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw7_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/proxymngr_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xprt_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/twm_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xutils_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xfs_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xnest_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libdps1_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibmesa3_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xserver-common_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xterm_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/x-window-system-core_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibs-pic_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibs_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xdm_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xbase-clients_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xvfb_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libdps-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xlibs-dev_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xmh_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/xfwp_4.1.0-16woody4_ia64.deb stable/main/binary-ia64/libxaw6_4.1.0-16woody4_ia64.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-i386/x-window-system-core_4.1.0-16woody4_i386.deb stable/main/binary-i386/proxymngr_4.1.0-16woody4_i386.deb stable/main/binary-i386/xnest_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibs_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibosmesa3_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw6-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/libdps-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/xterm_4.1.0-16woody4_i386.deb stable/main/binary-i386/xdm_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibs-pic_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw7_4.1.0-16woody4_i386.deb stable/main/binary-i386/libdps1-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/twm_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/xserver-common_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibs-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw7-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/libdps1_4.1.0-16woody4_i386.deb stable/main/binary-i386/xutils_4.1.0-16woody4_i386.deb stable/main/binary-i386/lbxproxy_4.1.0-16woody4_i386.deb stable/main/binary-i386/xvfb_4.1.0-16woody4_i386.deb stable/main/binary-i386/xbase-clients_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibs-dev_4.1.0-16woody4_i386.deb stable/main/binary-i386/xlibmesa3_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw6_4.1.0-16woody4_i386.deb stable/main/binary-i386/xfwp_4.1.0-16woody4_i386.deb stable/main/binary-i386/xmh_4.1.0-16woody4_i386.deb stable/main/binary-i386/xserver-xfree86_4.1.0-16woody4_i386.deb stable/main/binary-i386/xprt_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody4_i386.deb stable/main/binary-i386/xfs_4.1.0-16woody4_i386.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xserver-common_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibs-pic_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibs_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xprt_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/x-window-system-core_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xvfb_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xfwp_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw6_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/lbxproxy_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xmh_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/twm_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/proxymngr_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibs-dev_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xdm_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xutils_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libdps-dev_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xbase-clients_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libdps1_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xlibmesa3_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libxaw7_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xfs_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xnest_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody4_hppa.deb stable/main/binary-hppa/xterm_4.1.0-16woody4_hppa.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-arm/libdps1_4.1.0-16woody4_arm.deb stable/main/binary-arm/xnest_4.1.0-16woody4_arm.deb stable/main/binary-arm/xfwp_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody4_arm.deb stable/main/binary-arm/xdm_4.1.0-16woody4_arm.deb stable/main/binary-arm/libdps-dev_4.1.0-16woody4_arm.deb stable/main/binary-arm/xterm_4.1.0-16woody4_arm.deb stable/main/binary-arm/xmh_4.1.0-16woody4_arm.deb stable/main/binary-arm/proxymngr_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibmesa3_4.1.0-16woody4_arm.deb stable/main/binary-arm/x-window-system-core_4.1.0-16woody4_arm.deb stable/main/binary-arm/libdps1-dbg_4.1.0-16woody4_arm.deb stable/main/binary-arm/xbase-clients_4.1.0-16woody4_arm.deb stable/main/binary-arm/lbxproxy_4.1.0-16woody4_arm.deb stable/main/binary-arm/xfs_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw7_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw6_4.1.0-16woody4_arm.deb stable/main/binary-arm/xutils_4.1.0-16woody4_arm.deb stable/main/binary-arm/twm_4.1.0-16woody4_arm.deb stable/main/binary-arm/xserver-xfree86_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw7-dev_4.1.0-16woody4_arm.deb stable/main/binary-arm/xvfb_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw6-dev_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibs-dev_4.1.0-16woody4_arm.deb stable/main/binary-arm/xprt_4.1.0-16woody4_arm.deb stable/main/binary-arm/xserver-common_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibs-pic_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibs_4.1.0-16woody4_arm.deb stable/main/binary-arm/xlibs-dbg_4.1.0-16woody4_arm.deb stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody4_arm.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-alpha/twm_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xmh_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xprt_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/x-window-system-core_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibs_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw7_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw6_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xterm_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibs-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xvfb_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libdps-dev_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xnest_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/proxymngr_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xserver-common_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibs-pic_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibmesa3_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xdm_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xfwp_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/lbxproxy_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libdps1_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xbase-clients_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xfs_4.1.0-16woody4_alpha.deb stable/main/binary-alpha/xutils_4.1.0-16woody4_alpha.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xlib6g-dev_4.1.0-16woody4_all.deb stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibs_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xterm_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xspecs_4.1.0-16woody4_all.deb stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-pex_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-scalable_4.1.0-16woody4_all.deb stable/main/binary-powerpc/twm_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/libxaw7_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/libdps-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xvfb_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xutils_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-base_4.1.0-16woody4_all.deb stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody4_all.deb stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/libdps1_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xlib6g_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xdm_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xnest_4.1.0-16woody4_powerpc.deb stable/main/source/xfree86_4.1.0-16woody4.dsc stable/main/binary-all/xfonts-75dpi_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfree86-common_4.1.0-16woody4_all.deb stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody4_all.deb stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xprt_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-100dpi_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody4_powerpc.deb stable/main/binary-all/x-window-system_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xbase-clients_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/libxaw6_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xfs_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xfwp_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody4_powerpc.deb stable/main/source/xfree86_4.1.0-16woody4.diff.gz stable/main/binary-powerpc/proxymngr_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xmh_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.1.0-16woody4_powerpc.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody4_all.deb stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody4_powerpc.deb stable/main/binary-powerpc/xserver-common_4.1.0-16woody4_powerpc.deb xfree86 (4.1.0-16woody4) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm stable/main/binary-sparc/xconq_7.4.1-2woody2_sparc.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-s390/xconq_7.4.1-2woody2_s390.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-powerpc/xconq_7.4.1-2woody2_powerpc.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-mipsel/xconq_7.4.1-2woody2_mipsel.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-mips/xconq_7.4.1-2woody2_mips.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-m68k/xconq_7.4.1-2woody2_m68k.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-ia64/xconq_7.4.1-2woody2_ia64.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-hppa/xconq_7.4.1-2woody2_hppa.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-arm/xconq_7.4.1-2woody2_arm.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-alpha/xconq_7.4.1-2woody2_alpha.deb xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/source/xconq_7.4.1-2woody2.diff.gz stable/main/binary-all/xconq-common_7.4.1-2woody2_all.deb stable/main/binary-all/xconq-doc_7.4.1-2woody2_all.deb stable/main/binary-i386/xconq_7.4.1-2woody2_i386.deb stable/main/source/xconq_7.4.1-2woody2.dsc xconq (7.4.1-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows with long USER and DISPLAY environment variables (CAN-2003-0607) stable/main/binary-sparc/xchat_1.8.9-0woody3_sparc.deb stable/main/binary-sparc/xchat-text_1.8.9-0woody3_sparc.deb stable/main/binary-sparc/xchat-gnome_1.8.9-0woody3_sparc.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-s390/xchat-text_1.8.9-0woody3_s390.deb stable/main/binary-s390/xchat_1.8.9-0woody3_s390.deb stable/main/binary-s390/xchat-gnome_1.8.9-0woody3_s390.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-powerpc/xchat-gnome_1.8.9-0woody3_powerpc.deb stable/main/binary-powerpc/xchat_1.8.9-0woody3_powerpc.deb stable/main/binary-powerpc/xchat-text_1.8.9-0woody3_powerpc.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-mipsel/xchat_1.8.9-0woody3_mipsel.deb stable/main/binary-mipsel/xchat-text_1.8.9-0woody3_mipsel.deb stable/main/binary-mipsel/xchat-gnome_1.8.9-0woody3_mipsel.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-mips/xchat-gnome_1.8.9-0woody3_mips.deb stable/main/binary-mips/xchat-text_1.8.9-0woody3_mips.deb stable/main/binary-mips/xchat_1.8.9-0woody3_mips.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-m68k/xchat-gnome_1.8.9-0woody3_m68k.deb stable/main/binary-m68k/xchat_1.8.9-0woody3_m68k.deb stable/main/binary-m68k/xchat-text_1.8.9-0woody3_m68k.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-ia64/xchat-gnome_1.8.9-0woody3_ia64.deb stable/main/binary-ia64/xchat_1.8.9-0woody3_ia64.deb stable/main/binary-ia64/xchat-text_1.8.9-0woody3_ia64.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-hppa/xchat-gnome_1.8.9-0woody3_hppa.deb stable/main/binary-hppa/xchat-text_1.8.9-0woody3_hppa.deb stable/main/binary-hppa/xchat_1.8.9-0woody3_hppa.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-arm/xchat-text_1.8.9-0woody3_arm.deb stable/main/binary-arm/xchat-gnome_1.8.9-0woody3_arm.deb stable/main/binary-arm/xchat_1.8.9-0woody3_arm.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-alpha/xchat-text_1.8.9-0woody3_alpha.deb stable/main/binary-alpha/xchat-gnome_1.8.9-0woody3_alpha.deb stable/main/binary-alpha/xchat_1.8.9-0woody3_alpha.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-i386/xchat_1.8.9-0woody3_i386.deb stable/main/binary-all/xchat-common_1.8.9-0woody3_all.deb stable/main/source/xchat_1.8.9-0woody3.diff.gz stable/main/binary-i386/xchat-text_1.8.9-0woody3_i386.deb stable/main/source/xchat_1.8.9-0woody3.dsc stable/main/binary-i386/xchat-gnome_1.8.9-0woody3_i386.deb xchat (1.8.9-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix a remote exploit [src/common/server.c, CAN-2004-0409] stable/main/binary-sparc/xboing_2.4-26woody1_sparc.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-s390/xboing_2.4-26woody1_s390.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-powerpc/xboing_2.4-26woody1_powerpc.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-mipsel/xboing_2.4-26woody1_mipsel.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-mips/xboing_2.4-26woody1_mips.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-m68k/xboing_2.4-26woody1_m68k.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-ia64/xboing_2.4-26woody1_ia64.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-hppa/xboing_2.4-26woody1_hppa.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-arm/xboing_2.4-26woody1_arm.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-alpha/xboing_2.4-26woody1_alpha.deb xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/source/xboing_2.4-26woody1.diff.gz stable/main/binary-i386/xboing_2.4-26woody1_i386.deb stable/main/source/xboing_2.4-26woody1.dsc xboing (2.4-26woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix buffer overflows allowing execution of arbitary code with GID(games). (CAN-2004-0149) stable/main/binary-sparc/wv_0.7.1+rvt-2woody3_sparc.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-s390/wv_0.7.1+rvt-2woody3_s390.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-powerpc/wv_0.7.1+rvt-2woody3_powerpc.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-mipsel/wv_0.7.1+rvt-2woody3_mipsel.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-mips/wv_0.7.1+rvt-2woody3_mips.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-m68k/wv_0.7.1+rvt-2woody3_m68k.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-ia64/wv_0.7.1+rvt-2woody3_ia64.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-i386/wv_0.7.1+rvt-2woody3_i386.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-arm/wv_0.7.1+rvt-2woody3_arm.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-alpha/wv_0.7.1+rvt-2woody3_alpha.deb wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/source/wv_0.7.1+rvt-2woody3.dsc stable/main/binary-hppa/wv_0.7.1+rvt-2woody3_hppa.deb stable/main/source/wv_0.7.1+rvt-2woody3.diff.gz wv (0.7.1+rvt-2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Dom Lachowicz to fix arbitrary command execution [field.c, CAN-2004-0645] stable/main/binary-sparc/wu-ftpd_2.6.2-3woody4_sparc.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-s390/wu-ftpd_2.6.2-3woody4_s390.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody4_powerpc.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody4_mipsel.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-mips/wu-ftpd_2.6.2-3woody4_mips.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-m68k/wu-ftpd_2.6.2-3woody4_m68k.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-ia64/wu-ftpd_2.6.2-3woody4_ia64.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-hppa/wu-ftpd_2.6.2-3woody4_hppa.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-arm/wu-ftpd_2.6.2-3woody4_arm.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-alpha/wu-ftpd_2.6.2-3woody4_alpha.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/source/wu-ftpd_2.6.2-3woody4.dsc stable/main/source/wu-ftpd_2.6.2-3woody4.diff.gz stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody4_all.deb stable/main/binary-i386/wu-ftpd_2.6.2-3woody4_i386.deb wu-ftpd (2.6.2-3woody4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch skeychallenge.patch to fix buffer overflow in skey_challenge (CAN-2004-0185) stable/main/binary-sparc/wget_1.8.1-6.1_sparc.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-s390/wget_1.8.1-6.1_s390.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-powerpc/wget_1.8.1-6.1_powerpc.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-mipsel/wget_1.8.1-6.1_mipsel.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-mips/wget_1.8.1-6.1_mips.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-m68k/wget_1.8.1-6.1_m68k.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-ia64/wget_1.8.1-6.1_ia64.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-hppa/wget_1.8.1-6.1_hppa.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-arm/wget_1.8.1-6.1_arm.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-alpha/wget_1.8.1-6.1_alpha.deb wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/source/wget_1.8.1-6.1.diff.gz stable/main/binary-i386/wget_1.8.1-6.1_i386.deb stable/main/source/wget_1.8.1-6.1.dsc wget (1.8.1-6.1) stable-security; urgency=medium * Non-maintainer upload by security team * Fix directory traversal problem in FTP client * Fix buffer overrun in url_filename function stable/main/binary-all/webmin-xinetd_0.94-7woody3_all.deb stable/main/binary-all/webmin-lpadmin_0.94-7woody3_all.deb stable/main/binary-all/webmin-ssl_0.94-7woody3_all.deb stable/main/binary-all/webmin-mysql_0.94-7woody3_all.deb stable/main/source/webmin_0.94-7woody3.dsc stable/main/binary-all/webmin-cpan_0.94-7woody3_all.deb stable/main/binary-all/webmin-postgresql_0.94-7woody3_all.deb stable/main/binary-all/webmin-qmailadmin_0.94-7woody3_all.deb stable/main/binary-all/webmin-core_0.94-7woody3_all.deb stable/main/binary-all/webmin_0.94-7woody3_all.deb stable/main/binary-all/webmin-software_0.94-7woody3_all.deb stable/main/binary-all/webmin-dhcpd_0.94-7woody3_all.deb stable/main/binary-all/webmin-fetchmail_0.94-7woody3_all.deb stable/main/binary-all/webmin-inetd_0.94-7woody3_all.deb stable/main/binary-all/webmin-stunnel_0.94-7woody3_all.deb stable/main/binary-all/webmin-ppp_0.94-7woody3_all.deb stable/main/binary-all/webmin-exports_0.94-7woody3_all.deb stable/main/binary-all/webmin-burner_0.94-7woody3_all.deb stable/main/binary-all/webmin-postfix_0.94-7woody3_all.deb stable/main/binary-all/webmin-sshd_0.94-7woody3_all.deb stable/main/binary-all/webmin-apache_0.94-7woody3_all.deb stable/main/binary-all/webmin-cluster-useradmin_0.94-7woody3_all.deb stable/main/binary-all/webmin-nis_0.94-7woody3_all.deb stable/main/binary-all/webmin-jabber_0.94-7woody3_all.deb stable/main/binary-all/webmin-samba_0.94-7woody3_all.deb stable/main/source/webmin_0.94-7woody3.diff.gz stable/main/binary-all/webmin-mon_0.94-7woody3_all.deb stable/main/binary-all/webmin-wuftpd_0.94-7woody3_all.deb stable/main/binary-all/webmin-quota_0.94-7woody3_all.deb stable/main/binary-all/webmin-status_0.94-7woody3_all.deb stable/main/binary-all/webmin-cluster-software_0.94-7woody3_all.deb stable/main/binary-i386/webmin-grub_0.94-7woody3_i386.deb stable/main/binary-all/webmin-heartbeat_0.94-7woody3_all.deb stable/main/binary-all/webmin-raid_0.94-7woody3_all.deb stable/main/binary-all/webmin-sendmail_0.94-7woody3_all.deb stable/main/binary-all/webmin-bind8_0.94-7woody3_all.deb stable/main/binary-all/webmin-squid_0.94-7woody3_all.deb webmin (0.94-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied adjusted patch from upstream (Jamie Cameron) to fix insecure temporary file/directory usage [web-lib.pl, CAN-2004-0559] stable/main/binary-sparc/vbox3_0.1.7.1_sparc.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-s390/vbox3_0.1.7.1_s390.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-powerpc/vbox3_0.1.7.1_powerpc.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-mipsel/vbox3_0.1.7.1_mipsel.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-mips/vbox3_0.1.7.1_mips.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-m68k/vbox3_0.1.7.1_m68k.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-ia64/vbox3_0.1.7.1_ia64.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-hppa/vbox3_0.1.7.1_hppa.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-arm/vbox3_0.1.7.1_arm.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/binary-alpha/vbox3_0.1.7.1_alpha.deb vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/main/source/vbox3_0.1.7.1.dsc stable/main/binary-i386/vbox3_0.1.7.1_i386.deb stable/main/source/vbox3_0.1.7.1.tar.gz vbox3 (0.1.7.1) stable; urgency=high * vboxgetty/voice.c: bug: permissions were not dropped accurately before running user-controlled tclscript; a user was able to gain root permissions through the tclscript. fix: fork(), setgid(), setuid() before running tclscript, and let main process wait for child. See bug #218288. stable/non-free/binary-all/ttf-kochi-gothic-naga10_1.0.20030809-0woody.2_all.deb stable/non-free/source/ttf-kochi-naga10_1.0.20030809-0woody.2.dsc stable/non-free/binary-all/ttf-kochi-mincho-naga10_1.0.20030809-0woody.2_all.deb stable/non-free/source/ttf-kochi-naga10_1.0.20030809-0woody.2.diff.gz ttf-kochi-naga10 (1.0.20030809-0woody.2) stable; urgency=high * Update some descriptions to clear license problem. stable/main/binary-all/ttf-kochi-mincho_1.0.20030809-0woody.2_all.deb stable/main/source/ttf-kochi_1.0.20030809-0woody.2.dsc stable/main/source/ttf-kochi_1.0.20030809-0woody.2.diff.gz stable/main/binary-all/ttf-kochi-gothic_1.0.20030809-0woody.2_all.deb ttf-kochi (1.0.20030809-0woody.2) stable; urgency=high * Update some descriptions to clear license problem. stable/main/binary-s390/trr19_1.0beta5-15woody1_s390.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-powerpc/trr19_1.0beta5-15woody1_powerpc.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-mipsel/trr19_1.0beta5-15woody1_mipsel.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-mips/trr19_1.0beta5-15woody1_mips.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-m68k/trr19_1.0beta5-15woody1_m68k.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-ia64/trr19_1.0beta5-15woody1_ia64.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-i386/trr19_1.0beta5-15woody1_i386.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-hppa/trr19_1.0beta5-15woody1_hppa.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-arm/trr19_1.0beta5-15woody1_arm.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-alpha/trr19_1.0beta5-15woody1_alpha.deb trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-sparc/trr19_1.0beta5-15woody1_sparc.deb stable/main/source/trr19_1.0beta5-15woody1.dsc stable/main/source/trr19_1.0beta5-15woody1.diff.gz trr19 (1.0beta5-15woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047) stable/main/binary-s390/teg_0.9.2-2.1_s390.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/teg_0.9.2-2.1_powerpc.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/teg_0.9.2-2.1_mipsel.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/teg_0.9.2-2.1_mips.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/teg_0.9.2-2.1_m68k.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/teg_0.9.2-2.1_ia64.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/teg_0.9.2-2.1_i386.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/teg_0.9.2-2.1_hppa.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/teg_0.9.2-2.1_arm.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/teg_0.9.2-2.1_alpha.deb teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/source/teg_0.9.2-2.1.dsc stable/main/binary-sparc/teg_0.9.2-2.1_sparc.deb stable/main/source/teg_0.9.2-2.1.diff.gz teg (0.9.2-2.1) stable; urgency=medium * Non-maintainer upload by the stable release manager * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/tcpdump_3.6.2-2.8_sparc.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-s390/tcpdump_3.6.2-2.8_s390.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-powerpc/tcpdump_3.6.2-2.8_powerpc.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-mipsel/tcpdump_3.6.2-2.8_mipsel.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-mips/tcpdump_3.6.2-2.8_mips.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-m68k/tcpdump_3.6.2-2.8_m68k.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-ia64/tcpdump_3.6.2-2.8_ia64.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-hppa/tcpdump_3.6.2-2.8_hppa.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-arm/tcpdump_3.6.2-2.8_arm.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-alpha/tcpdump_3.6.2-2.8_alpha.deb tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/source/tcpdump_3.6.2-2.8.dsc stable/main/binary-i386/tcpdump_3.6.2-2.8_i386.deb stable/main/source/tcpdump_3.6.2-2.8.diff.gz tcpdump (3.6.2-2.8) stable-security; urgency=high * Backport changes from upstream CVS to fix ISAKMP payload handling denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184). Detailed changes (with corresponding upstream revisions): + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47) + Add data checks all over the place, change rawprint() prototype and add corresponding return value checks (print-isakmp.c, rev. 1.46) + Add missing ntohs() and change length initialization in isakmp_id_print(), not porting prototype changes (print-isakmp.c, rev. 1.45) stable/main/binary-sparc/sysstat_4.0.4-1woody2_sparc.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-s390/sysstat_4.0.4-1woody2_s390.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-powerpc/sysstat_4.0.4-1woody2_powerpc.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-mipsel/sysstat_4.0.4-1woody2_mipsel.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-mips/sysstat_4.0.4-1woody2_mips.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-m68k/sysstat_4.0.4-1woody2_m68k.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-ia64/sysstat_4.0.4-1woody2_ia64.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-hppa/sysstat_4.0.4-1woody2_hppa.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-arm/sysstat_4.0.4-1woody2_arm.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-alpha/sysstat_4.0.4-1woody2_alpha.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/source/sysstat_4.0.4-1woody2.dsc stable/main/binary-all/isag_4.0.4-1woody2_all.deb stable/main/source/sysstat_4.0.4-1woody2.diff.gz stable/main/binary-i386/sysstat_4.0.4-1woody2_i386.deb sysstat (4.0.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Robert Luberda to fix cases missed by the patch in 4.0.4-1woody1 (CAN-2004-0108) stable/main/binary-sparc/synaesthesia_2.1-2.1woody1_sparc.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-s390/synaesthesia_2.1-2.1woody1_s390.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-powerpc/synaesthesia_2.1-2.1woody1_powerpc.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-mipsel/synaesthesia_2.1-2.1woody1_mipsel.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-mips/synaesthesia_2.1-2.1woody1_mips.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-m68k/synaesthesia_2.1-2.1woody1_m68k.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-ia64/synaesthesia_2.1-2.1woody1_ia64.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-hppa/synaesthesia_2.1-2.1woody1_hppa.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-arm/synaesthesia_2.1-2.1woody1_arm.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-alpha/synaesthesia_2.1-2.1woody1_alpha.deb synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-i386/synaesthesia_2.1-2.1woody1_i386.deb stable/main/source/synaesthesia_2.1-2.1woody1.dsc stable/main/source/synaesthesia_2.1-2.1woody1.diff.gz synaesthesia (2.1-2.1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix a local symlink attack which allows the creation of arbitary files with gid games (CAN-2004-0160) by dropping privileges when writing config file stable/main/binary-sparc/super_3.16.1-1.2_sparc.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-s390/super_3.16.1-1.2_s390.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-powerpc/super_3.16.1-1.2_powerpc.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-mipsel/super_3.16.1-1.2_mipsel.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-mips/super_3.16.1-1.2_mips.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-m68k/super_3.16.1-1.2_m68k.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-ia64/super_3.16.1-1.2_ia64.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-hppa/super_3.16.1-1.2_hppa.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-arm/super_3.16.1-1.2_arm.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-alpha/super_3.16.1-1.2_alpha.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/source/super_3.16.1-1.2.dsc stable/main/source/super_3.16.1-1.2.diff.gz stable/main/binary-i386/super_3.16.1-1.2_i386.deb super (3.16.1-1.2) stable-security; urgency=high * Applied patch from upstream to fix format string vulnerability found by Max Vozeler . (CAN-2004-0579) stable/main/binary-sparc/sup_1.8-8woody2_sparc.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-s390/sup_1.8-8woody2_s390.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-powerpc/sup_1.8-8woody2_powerpc.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-mipsel/sup_1.8-8woody2_mipsel.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-mips/sup_1.8-8woody2_mips.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-m68k/sup_1.8-8woody2_m68k.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-ia64/sup_1.8-8woody2_ia64.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-hppa/sup_1.8-8woody2_hppa.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-arm/sup_1.8-8woody2_arm.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-alpha/sup_1.8-8woody2_alpha.deb sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/source/sup_1.8-8woody2.diff.gz stable/main/binary-i386/sup_1.8-8woody2_i386.deb stable/main/source/sup_1.8-8woody2.dsc sup (1.8-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c] (CAN-2004-0451) * Run pmake twice in debian/rules; for some reason the build fails otherwise, possibly a pmake bug stable/main/binary-sparc/ssmtp_2.50.6.1_sparc.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-s390/ssmtp_2.50.6.1_s390.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-powerpc/ssmtp_2.50.6.1_powerpc.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-mipsel/ssmtp_2.50.6.1_mipsel.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-mips/ssmtp_2.50.6.1_mips.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-m68k/ssmtp_2.50.6.1_m68k.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-ia64/ssmtp_2.50.6.1_ia64.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-hppa/ssmtp_2.50.6.1_hppa.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-arm/ssmtp_2.50.6.1_arm.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-alpha/ssmtp_2.50.6.1_alpha.deb ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/source/ssmtp_2.50.6.1.tar.gz stable/main/binary-i386/ssmtp_2.50.6.1_i386.deb stable/main/source/ssmtp_2.50.6.1.dsc ssmtp (2.50.6.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix two format string vulnerabilities (die() and log_event()) discovered by Max Vozeler (CAN-2004-0156) stable/main/binary-all/squirrelmail_1.2.6-1.4_all.deb stable/main/source/squirrelmail_1.2.6-1.4.diff.gz stable/main/source/squirrelmail_1.2.6-1.4.dsc squirrelmail (1:1.2.6-1.4) stable-security; urgency=high * Non-maintainer upload for security issues. Thanks to Thijs Kinkhorst for tracking down the 1.2.x issues * [CAN-2004-0521] Fix SQL injection vulnerability when using addressbook-in-SQL-database (Closes: #257961) * [CAN-2004-0519, CAN-2004-0520] Fix multiple XSS issues, some exploitable by incoming email (Closes: #257972) * [CAN-2004-0639] Backport fixes for multiple XSS issues found between 1.2.6 and 1.2.12, some exploitable by incoming email (Closes: #257973) * Fix a bug preventing the Table of Contents of the Help system to be shown, which was introduced in the 1:1.2.6-1.1 security update. stable/main/binary-sparc/squidclient_2.4.6-2woody2_sparc.deb stable/main/binary-sparc/squid-cgi_2.4.6-2woody2_sparc.deb stable/main/binary-sparc/squid_2.4.6-2woody2_sparc.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-s390/squid-cgi_2.4.6-2woody2_s390.deb stable/main/binary-s390/squid_2.4.6-2woody2_s390.deb stable/main/binary-s390/squidclient_2.4.6-2woody2_s390.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-powerpc/squid-cgi_2.4.6-2woody2_powerpc.deb stable/main/binary-powerpc/squidclient_2.4.6-2woody2_powerpc.deb stable/main/binary-powerpc/squid_2.4.6-2woody2_powerpc.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-mipsel/squidclient_2.4.6-2woody2_mipsel.deb stable/main/binary-mipsel/squid_2.4.6-2woody2_mipsel.deb stable/main/binary-mipsel/squid-cgi_2.4.6-2woody2_mipsel.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-mips/squid_2.4.6-2woody2_mips.deb stable/main/binary-mips/squid-cgi_2.4.6-2woody2_mips.deb stable/main/binary-mips/squidclient_2.4.6-2woody2_mips.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-m68k/squid_2.4.6-2woody2_m68k.deb stable/main/binary-m68k/squidclient_2.4.6-2woody2_m68k.deb stable/main/binary-m68k/squid-cgi_2.4.6-2woody2_m68k.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-ia64/squid-cgi_2.4.6-2woody2_ia64.deb stable/main/binary-ia64/squidclient_2.4.6-2woody2_ia64.deb stable/main/binary-ia64/squid_2.4.6-2woody2_ia64.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-hppa/squid-cgi_2.4.6-2woody2_hppa.deb stable/main/binary-hppa/squidclient_2.4.6-2woody2_hppa.deb stable/main/binary-hppa/squid_2.4.6-2woody2_hppa.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-arm/squid_2.4.6-2woody2_arm.deb stable/main/binary-arm/squidclient_2.4.6-2woody2_arm.deb stable/main/binary-arm/squid-cgi_2.4.6-2woody2_arm.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-alpha/squid-cgi_2.4.6-2woody2_alpha.deb stable/main/binary-alpha/squid_2.4.6-2woody2_alpha.deb stable/main/binary-alpha/squidclient_2.4.6-2woody2_alpha.deb squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/source/squid_2.4.6-2woody2.dsc stable/main/binary-i386/squid-cgi_2.4.6-2woody2_i386.deb stable/main/binary-i386/squid_2.4.6-2woody2_i386.deb stable/main/binary-i386/squidclient_2.4.6-2woody2_i386.deb stable/main/source/squid_2.4.6-2woody2.diff.gz squid (2.4.6-2woody2) stable-security; urgency=high * Upload to woody-proposed-updates because of security issues. * Added patch to fix vulnerability allowing url_regex ACLs to be bypassed (CAN-2004-0189) (Closes: #240920) o squid-2.5.STABLE4-00.patch stable/main/binary-sparc/spamassassin_2.20-1woody4_sparc.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-s390/spamassassin_2.20-1woody4_s390.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-powerpc/spamassassin_2.20-1woody4_powerpc.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-mipsel/spamassassin_2.20-1woody4_mipsel.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-mips/spamassassin_2.20-1woody4_mips.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-m68k/spamassassin_2.20-1woody4_m68k.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-ia64/spamassassin_2.20-1woody4_ia64.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-hppa/spamassassin_2.20-1woody4_hppa.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-arm/spamassassin_2.20-1woody4_arm.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-alpha/spamassassin_2.20-1woody4_alpha.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/source/spamassassin_2.20-1woody4.dsc stable/main/source/spamassassin_2.20-1woody4.diff.gz stable/main/binary-i386/spamassassin_2.20-1woody4_i386.deb spamassassin (2.20-1woody4) proposed-updates; urgency=low * Argh. Someone forgot to build 2.20-1woody3 on a woody system leading to incorrect versioned Recommends: on libc. (Closes: #222331, #222372, #222474) stable/main/binary-sparc/sox_12.17.3-4woody2_sparc.deb stable/main/binary-sparc/sox-dev_12.17.3-4woody2_sparc.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-s390/sox_12.17.3-4woody2_s390.deb stable/main/binary-s390/sox-dev_12.17.3-4woody2_s390.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-powerpc/sox_12.17.3-4woody2_powerpc.deb stable/main/binary-powerpc/sox-dev_12.17.3-4woody2_powerpc.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-mipsel/sox_12.17.3-4woody2_mipsel.deb stable/main/binary-mipsel/sox-dev_12.17.3-4woody2_mipsel.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-mips/sox_12.17.3-4woody2_mips.deb stable/main/binary-mips/sox-dev_12.17.3-4woody2_mips.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-m68k/sox-dev_12.17.3-4woody2_m68k.deb stable/main/binary-m68k/sox_12.17.3-4woody2_m68k.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-ia64/sox_12.17.3-4woody2_ia64.deb stable/main/binary-ia64/sox-dev_12.17.3-4woody2_ia64.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-hppa/sox_12.17.3-4woody2_hppa.deb stable/main/binary-hppa/sox-dev_12.17.3-4woody2_hppa.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-arm/sox-dev_12.17.3-4woody2_arm.deb stable/main/binary-arm/sox_12.17.3-4woody2_arm.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-alpha/sox-dev_12.17.3-4woody2_alpha.deb stable/main/binary-alpha/sox_12.17.3-4woody2_alpha.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/source/sox_12.17.3-4woody2.dsc stable/main/binary-i386/sox-dev_12.17.3-4woody2_i386.deb stable/main/source/sox_12.17.3-4woody2.diff.gz stable/main/binary-i386/sox_12.17.3-4woody2_i386.deb sox (12.17.3-4woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. * Added s390x as valid architecture since the kernel on the main S/390 buildd was upgraded and now runs in 64bit mode. stable/main/binary-sparc/sendmail_8.12.3-7.1_sparc.deb stable/main/binary-sparc/libmilter-dev_8.12.3-7.1_sparc.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-s390/libmilter-dev_8.12.3-7.1_s390.deb stable/main/binary-s390/sendmail_8.12.3-7.1_s390.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-powerpc/sendmail_8.12.3-7.1_powerpc.deb stable/main/binary-powerpc/libmilter-dev_8.12.3-7.1_powerpc.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-mipsel/libmilter-dev_8.12.3-7.1_mipsel.deb stable/main/binary-mipsel/sendmail_8.12.3-7.1_mipsel.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-mips/libmilter-dev_8.12.3-7.1_mips.deb stable/main/binary-mips/sendmail_8.12.3-7.1_mips.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-m68k/sendmail_8.12.3-7.1_m68k.deb stable/main/binary-m68k/libmilter-dev_8.12.3-7.1_m68k.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-ia64/libmilter-dev_8.12.3-7.1_ia64.deb stable/main/binary-ia64/sendmail_8.12.3-7.1_ia64.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-hppa/libmilter-dev_8.12.3-7.1_hppa.deb stable/main/binary-hppa/sendmail_8.12.3-7.1_hppa.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-arm/libmilter-dev_8.12.3-7.1_arm.deb stable/main/binary-arm/sendmail_8.12.3-7.1_arm.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-alpha/libmilter-dev_8.12.3-7.1_alpha.deb stable/main/binary-alpha/sendmail_8.12.3-7.1_alpha.deb sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/main/binary-i386/sendmail_8.12.3-7.1_i386.deb stable/main/binary-i386/libmilter-dev_8.12.3-7.1_i386.deb stable/main/binary-all/sendmail-doc_8.12.3-7.1_all.deb stable/main/source/sendmail_8.12.3-7.1.dsc stable/main/source/sendmail_8.12.3-7.1.diff.gz sendmail (8.12.3-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected the patch to not use default settings for the sasldb [debian/local/update_auth.in, CAN-2004-0833] stable/non-free/binary-sparc/scsh_0.6.0-2woody1_sparc.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-s390/scsh_0.6.0-2woody1_s390.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-powerpc/scsh_0.6.0-2woody1_powerpc.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-mipsel/scsh_0.6.0-2woody1_mipsel.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-mips/scsh_0.6.0-2woody1_mips.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-m68k/scsh_0.6.0-2woody1_m68k.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-hppa/scsh_0.6.0-2woody1_hppa.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/binary-arm/scsh_0.6.0-2woody1_arm.deb scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/non-free/source/scsh_0.6.0-2woody1.dsc stable/non-free/binary-i386/scsh_0.6.0-2woody1_i386.deb stable/non-free/source/scsh_0.6.0-2woody1.diff.gz scsh (0.6.0-2woody1) stable; urgency=low * Updated debian/copyright: removed confusing claim about license being DFSG compliant, added some copyright notices. * Sponsored upload done by Joost van Baal . stable/main/binary-sparc/screen_3.9.11-5woody1_sparc.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-s390/screen_3.9.11-5woody1_s390.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-powerpc/screen_3.9.11-5woody1_powerpc.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-mipsel/screen_3.9.11-5woody1_mipsel.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-mips/screen_3.9.11-5woody1_mips.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-m68k/screen_3.9.11-5woody1_m68k.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-ia64/screen_3.9.11-5woody1_ia64.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-hppa/screen_3.9.11-5woody1_hppa.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-arm/screen_3.9.11-5woody1_arm.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-alpha/screen_3.9.11-5woody1_alpha.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/source/screen_3.9.11-5woody1.dsc stable/main/source/screen_3.9.11-5woody1.diff.gz stable/main/binary-i386/screen_3.9.11-5woody1_i386.deb screen (3.9.11-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Timo Sirainen to fix buffer integer overflow (CAN-2003-0972) stable/main/binary-sparc/swat_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/samba_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/samba-common_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/libpam-smbpass_2.2.3a-14.1_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-14.1_sparc.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-s390/libpam-smbpass_2.2.3a-14.1_s390.deb stable/main/binary-s390/libsmbclient-dev_2.2.3a-14.1_s390.deb stable/main/binary-s390/samba-common_2.2.3a-14.1_s390.deb stable/main/binary-s390/smbfs_2.2.3a-14.1_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-14.1_s390.deb stable/main/binary-s390/smbclient_2.2.3a-14.1_s390.deb stable/main/binary-s390/winbind_2.2.3a-14.1_s390.deb stable/main/binary-s390/swat_2.2.3a-14.1_s390.deb stable/main/binary-s390/samba_2.2.3a-14.1_s390.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-powerpc/samba_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/winbind_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-14.1_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-14.1_powerpc.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-mipsel/samba-common_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/smbfs_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/smbclient_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-14.1_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-14.1_mipsel.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-mips/smbclient_2.2.3a-14.1_mips.deb stable/main/binary-mips/swat_2.2.3a-14.1_mips.deb stable/main/binary-mips/smbfs_2.2.3a-14.1_mips.deb stable/main/binary-mips/samba-common_2.2.3a-14.1_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-14.1_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-14.1_mips.deb stable/main/binary-mips/winbind_2.2.3a-14.1_mips.deb stable/main/binary-mips/samba_2.2.3a-14.1_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-14.1_mips.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-m68k/smbfs_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/samba_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/swat_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/samba-common_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/winbind_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-14.1_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-14.1_m68k.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-ia64/smbfs_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/smbclient_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/samba_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/libsmbclient_2.2.3a-14.1_ia64.deb stable/main/binary-ia64/swat_2.2.3a-14.1_ia64.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-hppa/swat_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/samba_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/libsmbclient_2.2.3a-14.1_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-14.1_hppa.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-arm/smbclient_2.2.3a-14.1_arm.deb stable/main/binary-arm/samba_2.2.3a-14.1_arm.deb stable/main/binary-arm/winbind_2.2.3a-14.1_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-14.1_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-14.1_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-14.1_arm.deb stable/main/binary-arm/swat_2.2.3a-14.1_arm.deb stable/main/binary-arm/smbfs_2.2.3a-14.1_arm.deb stable/main/binary-arm/samba-common_2.2.3a-14.1_arm.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-alpha/libsmbclient-dev_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/libpam-smbpass_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/smbclient_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/samba_2.2.3a-14.1_alpha.deb stable/main/binary-alpha/swat_2.2.3a-14.1_alpha.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-i386/samba-common_2.2.3a-14.1_i386.deb stable/main/binary-all/samba-doc_2.2.3a-14.1_all.deb stable/main/binary-i386/swat_2.2.3a-14.1_i386.deb stable/main/source/samba_2.2.3a-14.1.diff.gz stable/main/binary-i386/libsmbclient-dev_2.2.3a-14.1_i386.deb stable/main/source/samba_2.2.3a-14.1.dsc stable/main/binary-i386/smbfs_2.2.3a-14.1_i386.deb stable/main/binary-i386/winbind_2.2.3a-14.1_i386.deb stable/main/binary-i386/libpam-smbpass_2.2.3a-14.1_i386.deb stable/main/binary-i386/smbclient_2.2.3a-14.1_i386.deb stable/main/binary-i386/samba_2.2.3a-14.1_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-14.1_i386.deb samba (2.2.3a-14.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean up patch differenced between -13 and -14 stable/main/binary-sparc/ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libcurses-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libreadline-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libdbm-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libsdbm-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libnkf-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libsyslog-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libtk-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libtcltk-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libgdbm-ruby_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/ruby-dev_1.6.7-3woody3_sparc.deb stable/main/binary-sparc/libpty-ruby_1.6.7-3woody3_sparc.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-s390/libdbm-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libgdbm-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libcurses-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libreadline-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libpty-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libnkf-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libtk-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libsdbm-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/libsyslog-ruby_1.6.7-3woody3_s390.deb stable/main/binary-s390/ruby-dev_1.6.7-3woody3_s390.deb stable/main/binary-s390/libtcltk-ruby_1.6.7-3woody3_s390.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-powerpc/ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/ruby-dev_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libtk-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libreadline-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libcurses-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libsdbm-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libnkf-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libdbm-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libpty-ruby_1.6.7-3woody3_powerpc.deb stable/main/binary-powerpc/libsyslog-ruby_1.6.7-3woody3_powerpc.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-mipsel/libtcltk-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libdbm-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libreadline-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libnkf-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/ruby-dev_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libsdbm-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libpty-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libtk-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libsyslog-ruby_1.6.7-3woody3_mipsel.deb stable/main/binary-mipsel/libcurses-ruby_1.6.7-3woody3_mipsel.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-mips/libsdbm-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libgdbm-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libpty-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libreadline-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/ruby-dev_1.6.7-3woody3_mips.deb stable/main/binary-mips/libtcltk-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libdbm-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libtk-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libcurses-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libsyslog-ruby_1.6.7-3woody3_mips.deb stable/main/binary-mips/libnkf-ruby_1.6.7-3woody3_mips.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-m68k/libsdbm-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/ruby-dev_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libpty-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libnkf-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libtcltk-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libcurses-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libtk-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libsyslog-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libgdbm-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libreadline-ruby_1.6.7-3woody3_m68k.deb stable/main/binary-m68k/libdbm-ruby_1.6.7-3woody3_m68k.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-ia64/libgdbm-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libpty-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libsdbm-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libreadline-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libtk-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libdbm-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libsyslog-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libcurses-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libnkf-ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/ruby_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/ruby-dev_1.6.7-3woody3_ia64.deb stable/main/binary-ia64/libtcltk-ruby_1.6.7-3woody3_ia64.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-hppa/libsdbm-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libdbm-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libsyslog-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libpty-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libtk-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/ruby-dev_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libtcltk-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libcurses-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libnkf-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libgdbm-ruby_1.6.7-3woody3_hppa.deb stable/main/binary-hppa/libreadline-ruby_1.6.7-3woody3_hppa.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-arm/libsyslog-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libsdbm-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libcurses-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libtk-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libpty-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libtcltk-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libnkf-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/ruby-dev_1.6.7-3woody3_arm.deb stable/main/binary-arm/libdbm-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libreadline-ruby_1.6.7-3woody3_arm.deb stable/main/binary-arm/libgdbm-ruby_1.6.7-3woody3_arm.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-alpha/libdbm-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libgdbm-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libpty-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libtcltk-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libnkf-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libcurses-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/ruby-dev_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libtk-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libreadline-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libsyslog-ruby_1.6.7-3woody3_alpha.deb stable/main/binary-alpha/libsdbm-ruby_1.6.7-3woody3_alpha.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-i386/libgdbm-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libsyslog-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libtcltk-ruby_1.6.7-3woody3_i386.deb stable/main/source/ruby_1.6.7-3woody3.diff.gz stable/main/binary-i386/libnkf-ruby_1.6.7-3woody3_i386.deb stable/main/binary-all/irb_1.6.7-3woody3_all.deb stable/main/source/ruby_1.6.7-3woody3.dsc stable/main/binary-i386/libpty-ruby_1.6.7-3woody3_i386.deb stable/main/binary-all/ruby-examples_1.6.7-3woody3_all.deb stable/main/binary-i386/libreadline-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libdbm-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libtk-ruby_1.6.7-3woody3_i386.deb stable/main/binary-all/ruby-elisp_1.6.7-3woody3_all.deb stable/main/binary-i386/libruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libsdbm-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/libcurses-ruby_1.6.7-3woody3_i386.deb stable/main/binary-i386/ruby-dev_1.6.7-3woody3_i386.deb ruby (1.6.7-3woody3) stable-security; urgency=high * fixed typo in debian/patches/810_cgi_session.patch. stable/main/binary-sparc/rsync_2.5.5-0.6_sparc.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-s390/rsync_2.5.5-0.6_s390.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-powerpc/rsync_2.5.5-0.6_powerpc.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-mipsel/rsync_2.5.5-0.6_mipsel.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-mips/rsync_2.5.5-0.6_mips.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-m68k/rsync_2.5.5-0.6_m68k.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-ia64/rsync_2.5.5-0.6_ia64.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-i386/rsync_2.5.5-0.6_i386.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-hppa/rsync_2.5.5-0.6_hppa.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-arm/rsync_2.5.5-0.6_arm.deb rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/source/rsync_2.5.5-0.6.dsc stable/main/binary-alpha/rsync_2.5.5-0.6_alpha.deb stable/main/source/rsync_2.5.5-0.6.diff.gz rsync (2.5.5-0.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to prevent unauthorised file access [util.c, http://samba.org/rsync/#security_aug04, Bug#265662] stable/main/binary-sparc/pppoe_3.3-1.2_sparc.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-s390/pppoe_3.3-1.2_s390.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-powerpc/pppoe_3.3-1.2_powerpc.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-mipsel/pppoe_3.3-1.2_mipsel.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-mips/pppoe_3.3-1.2_mips.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-m68k/pppoe_3.3-1.2_m68k.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-ia64/pppoe_3.3-1.2_ia64.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-hppa/pppoe_3.3-1.2_hppa.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-arm/pppoe_3.3-1.2_arm.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-alpha/pppoe_3.3-1.2_alpha.deb rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-i386/pppoe_3.3-1.2_i386.deb stable/main/source/rp-pppoe_3.3-1.2.dsc stable/main/source/rp-pppoe_3.3-1.2.diff.gz rp-pppoe (3.3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Max Vozeler to ignore -D and -p when pppoe is not running as root to prevent a potential root compromise when pppoe is running setuid root [src/pppoe.c, CAN-2004-0564] stable/main/binary-s390/rinetd_0.61-1.1_s390.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-powerpc/rinetd_0.61-1.1_powerpc.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-mipsel/rinetd_0.61-1.1_mipsel.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-mips/rinetd_0.61-1.1_mips.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-m68k/rinetd_0.61-1.1_m68k.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-ia64/rinetd_0.61-1.1_ia64.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-i386/rinetd_0.61-1.1_i386.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-hppa/rinetd_0.61-1.1_hppa.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-arm/rinetd_0.61-1.1_arm.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-alpha/rinetd_0.61-1.1_alpha.deb rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/source/rinetd_0.61-1.1.diff.gz stable/main/binary-sparc/rinetd_0.61-1.1_sparc.deb stable/main/source/rinetd_0.61-1.1.dsc rinetd (0.61-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Sam Hocevar to correct array resizing (rinetd.c) stable/main/binary-sparc/libqt3-mt-odbc_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqxt0_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-mt-dev_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-mt_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-mysql_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-mt-mysql_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-dev_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/qt3-tools_3.0.3-20020329-1woody2_sparc.deb stable/main/binary-sparc/libqt3-odbc_3.0.3-20020329-1woody2_sparc.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-s390/libqt3-mt-odbc_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-mt-dev_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-mysql_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-dev_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqxt0_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-mt-mysql_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-mt_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3-odbc_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/libqt3_3.0.3-20020329-1woody2_s390.deb stable/main/binary-s390/qt3-tools_3.0.3-20020329-1woody2_s390.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-powerpc/libqt3-mt_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-mysql_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-odbc_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-dev_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-odbc_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqxt0_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-mysql_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-dev_3.0.3-20020329-1woody2_powerpc.deb stable/main/binary-powerpc/qt3-tools_3.0.3-20020329-1woody2_powerpc.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-mipsel/qt3-tools_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-odbc_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-mysql_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqxt0_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-dev_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-mt_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-dev_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-odbc_3.0.3-20020329-1woody2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-mysql_3.0.3-20020329-1woody2_mipsel.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-mips/libqt3-dev_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/qt3-tools_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-mt-dev_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-mt_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-odbc_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqxt0_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-mt-odbc_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-mysql_3.0.3-20020329-1woody2_mips.deb stable/main/binary-mips/libqt3-mt-mysql_3.0.3-20020329-1woody2_mips.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-m68k/libqt3-dev_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-mt_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-mt-dev_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-mt-odbc_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/qt3-tools_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqxt0_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-mysql_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-odbc_3.0.3-20020329-1woody2_m68k.deb stable/main/binary-m68k/libqt3-mt-mysql_3.0.3-20020329-1woody2_m68k.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-ia64/qt3-tools_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-mt-odbc_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-odbc_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-mt-dev_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-mysql_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqxt0_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-mt-mysql_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-dev_3.0.3-20020329-1woody2_ia64.deb stable/main/binary-ia64/libqt3-mt_3.0.3-20020329-1woody2_ia64.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-i386/libqt3-mt-mysql_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-dev_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/qt3-tools_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-mysql_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqxt0_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-mt_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-mt-dev_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-mt-odbc_3.0.3-20020329-1woody2_i386.deb stable/main/binary-i386/libqt3-odbc_3.0.3-20020329-1woody2_i386.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-hppa/libqt3-mt-odbc_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-odbc_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqxt0_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-dev_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-mt_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-mysql_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/qt3-tools_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-mt-dev_3.0.3-20020329-1woody2_hppa.deb stable/main/binary-hppa/libqt3-mt-mysql_3.0.3-20020329-1woody2_hppa.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-arm/libqt3-mt-mysql_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-odbc_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-mt_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/qt3-tools_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-mt-dev_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-mt-odbc_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-mysql_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqt3-dev_3.0.3-20020329-1woody2_arm.deb stable/main/binary-arm/libqxt0_3.0.3-20020329-1woody2_arm.deb qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-alpha/libqxt0_3.0.3-20020329-1woody2_alpha.deb stable/main/source/qt-copy_3.0.3-20020329-1woody2.dsc stable/main/binary-alpha/libqt3-dev_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-mt_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-all/qt3-doc_3.0.3-20020329-1woody2_all.deb stable/main/binary-alpha/qt3-tools_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-mysql_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-mt-odbc_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-mt-mysql_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-mt-dev_3.0.3-20020329-1woody2_alpha.deb stable/main/binary-alpha/libqt3-odbc_3.0.3-20020329-1woody2_alpha.deb stable/main/source/qt-copy_3.0.3-20020329-1woody2.diff.gz qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against broken GIF DoS [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693] * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed upstream [src/kernel/qimage.cpp, CAN-2004-0692] * Applied patch by Chris Evans to fix broken BMP handling that can result in arbitrary code execution [src/kernel/qimage.cpp, CAN-2004-0691] stable/main/binary-sparc/python2.2-mpz_2.2.1-4.6_sparc.deb stable/main/binary-sparc/python2.2_2.2.1-4.6_sparc.deb stable/main/binary-sparc/python2.2-gdbm_2.2.1-4.6_sparc.deb stable/main/binary-sparc/python2.2-dev_2.2.1-4.6_sparc.deb stable/main/binary-sparc/python2.2-xmlbase_2.2.1-4.6_sparc.deb stable/main/binary-sparc/python2.2-tk_2.2.1-4.6_sparc.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-s390/python2.2-mpz_2.2.1-4.6_s390.deb stable/main/binary-s390/python2.2-tk_2.2.1-4.6_s390.deb stable/main/binary-s390/python2.2-xmlbase_2.2.1-4.6_s390.deb stable/main/binary-s390/python2.2-gdbm_2.2.1-4.6_s390.deb stable/main/binary-s390/python2.2-dev_2.2.1-4.6_s390.deb stable/main/binary-s390/python2.2_2.2.1-4.6_s390.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-powerpc/python2.2-mpz_2.2.1-4.6_powerpc.deb stable/main/binary-powerpc/python2.2-tk_2.2.1-4.6_powerpc.deb stable/main/binary-powerpc/python2.2-dev_2.2.1-4.6_powerpc.deb stable/main/binary-powerpc/python2.2-gdbm_2.2.1-4.6_powerpc.deb stable/main/binary-powerpc/python2.2-xmlbase_2.2.1-4.6_powerpc.deb stable/main/binary-powerpc/python2.2_2.2.1-4.6_powerpc.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-mipsel/python2.2-mpz_2.2.1-4.6_mipsel.deb stable/main/binary-mipsel/python2.2-xmlbase_2.2.1-4.6_mipsel.deb stable/main/binary-mipsel/python2.2-dev_2.2.1-4.6_mipsel.deb stable/main/binary-mipsel/python2.2_2.2.1-4.6_mipsel.deb stable/main/binary-mipsel/python2.2-gdbm_2.2.1-4.6_mipsel.deb stable/main/binary-mipsel/python2.2-tk_2.2.1-4.6_mipsel.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-mips/python2.2-tk_2.2.1-4.6_mips.deb stable/main/binary-mips/python2.2-xmlbase_2.2.1-4.6_mips.deb stable/main/binary-mips/python2.2-mpz_2.2.1-4.6_mips.deb stable/main/binary-mips/python2.2_2.2.1-4.6_mips.deb stable/main/binary-mips/python2.2-dev_2.2.1-4.6_mips.deb stable/main/binary-mips/python2.2-gdbm_2.2.1-4.6_mips.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-m68k/python2.2_2.2.1-4.6_m68k.deb stable/main/binary-m68k/python2.2-tk_2.2.1-4.6_m68k.deb stable/main/binary-m68k/python2.2-gdbm_2.2.1-4.6_m68k.deb stable/main/binary-m68k/python2.2-mpz_2.2.1-4.6_m68k.deb stable/main/binary-m68k/python2.2-xmlbase_2.2.1-4.6_m68k.deb stable/main/binary-m68k/python2.2-dev_2.2.1-4.6_m68k.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-ia64/python2.2-xmlbase_2.2.1-4.6_ia64.deb stable/main/binary-ia64/python2.2-gdbm_2.2.1-4.6_ia64.deb stable/main/binary-ia64/python2.2-dev_2.2.1-4.6_ia64.deb stable/main/binary-ia64/python2.2_2.2.1-4.6_ia64.deb stable/main/binary-ia64/python2.2-tk_2.2.1-4.6_ia64.deb stable/main/binary-ia64/python2.2-mpz_2.2.1-4.6_ia64.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-hppa/python2.2-gdbm_2.2.1-4.6_hppa.deb stable/main/binary-hppa/python2.2-tk_2.2.1-4.6_hppa.deb stable/main/binary-hppa/python2.2-mpz_2.2.1-4.6_hppa.deb stable/main/binary-hppa/python2.2-dev_2.2.1-4.6_hppa.deb stable/main/binary-hppa/python2.2-xmlbase_2.2.1-4.6_hppa.deb stable/main/binary-hppa/python2.2_2.2.1-4.6_hppa.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-arm/python2.2_2.2.1-4.6_arm.deb stable/main/binary-arm/python2.2-xmlbase_2.2.1-4.6_arm.deb stable/main/binary-arm/python2.2-mpz_2.2.1-4.6_arm.deb stable/main/binary-arm/python2.2-gdbm_2.2.1-4.6_arm.deb stable/main/binary-arm/python2.2-tk_2.2.1-4.6_arm.deb stable/main/binary-arm/python2.2-dev_2.2.1-4.6_arm.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-alpha/python2.2-xmlbase_2.2.1-4.6_alpha.deb stable/main/binary-alpha/python2.2-gdbm_2.2.1-4.6_alpha.deb stable/main/binary-alpha/python2.2-tk_2.2.1-4.6_alpha.deb stable/main/binary-alpha/python2.2-dev_2.2.1-4.6_alpha.deb stable/main/binary-alpha/python2.2-mpz_2.2.1-4.6_alpha.deb stable/main/binary-alpha/python2.2_2.2.1-4.6_alpha.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-all/python2.2-elisp_2.2.1-4.6_all.deb stable/main/source/python2.2_2.2.1-4.6.dsc stable/main/binary-i386/python2.2-dev_2.2.1-4.6_i386.deb stable/main/binary-i386/python2.2-gdbm_2.2.1-4.6_i386.deb stable/main/binary-i386/python2.2-xmlbase_2.2.1-4.6_i386.deb stable/main/binary-i386/python2.2-mpz_2.2.1-4.6_i386.deb stable/main/source/python2.2_2.2.1-4.6.diff.gz stable/main/binary-i386/python2.2-tk_2.2.1-4.6_i386.deb stable/main/binary-all/idle-python2.2_2.2.1-4.6_all.deb stable/main/binary-all/python2.2-doc_2.2.1-4.6_all.deb stable/main/binary-all/python2.2-examples_2.2.1-4.6_all.deb stable/main/binary-i386/python2.2_2.2.1-4.6_i386.deb python2.2 (2.2.1-4.6) stable-security; urgency=high * Revert patch suggested for #248946. Closes: #269548. * Apply upstream patch to fix #248946. * Note: In previous security updates, ipv6 was enabled on some architectures, depending on the uploaded package. It's now explicitely disabled on all architectures. stable/main/binary-sparc/libpgtcl_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/postgresql-dev_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/libecpg3_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/postgresql_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/python-pygresql_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/libpgperl_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/postgresql-client_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/pgaccess_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/libpgsql2_7.2.1-2woody5_sparc.deb stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody5_sparc.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-s390/libpgsql2_7.2.1-2woody5_s390.deb stable/main/binary-s390/odbc-postgresql_7.2.1-2woody5_s390.deb stable/main/binary-s390/libpgtcl_7.2.1-2woody5_s390.deb stable/main/binary-s390/pgaccess_7.2.1-2woody5_s390.deb stable/main/binary-s390/postgresql-dev_7.2.1-2woody5_s390.deb stable/main/binary-s390/libecpg3_7.2.1-2woody5_s390.deb stable/main/binary-s390/postgresql-contrib_7.2.1-2woody5_s390.deb stable/main/binary-s390/libpgperl_7.2.1-2woody5_s390.deb stable/main/binary-s390/postgresql_7.2.1-2woody5_s390.deb stable/main/binary-s390/python-pygresql_7.2.1-2woody5_s390.deb stable/main/binary-s390/postgresql-client_7.2.1-2woody5_s390.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-powerpc/postgresql_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/libecpg3_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/pgaccess_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/libpgsql2_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/libpgperl_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/python-pygresql_7.2.1-2woody5_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody5_powerpc.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-mipsel/libpgsql2_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/libpgperl_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/pgaccess_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/libecpg3_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/postgresql_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/python-pygresql_7.2.1-2woody5_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.2.1-2woody5_mipsel.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-mips/postgresql-dev_7.2.1-2woody5_mips.deb stable/main/binary-mips/odbc-postgresql_7.2.1-2woody5_mips.deb stable/main/binary-mips/libpgtcl_7.2.1-2woody5_mips.deb stable/main/binary-mips/libecpg3_7.2.1-2woody5_mips.deb stable/main/binary-mips/pgaccess_7.2.1-2woody5_mips.deb stable/main/binary-mips/postgresql-contrib_7.2.1-2woody5_mips.deb stable/main/binary-mips/python-pygresql_7.2.1-2woody5_mips.deb stable/main/binary-mips/postgresql-client_7.2.1-2woody5_mips.deb stable/main/binary-mips/libpgsql2_7.2.1-2woody5_mips.deb stable/main/binary-mips/postgresql_7.2.1-2woody5_mips.deb stable/main/binary-mips/libpgperl_7.2.1-2woody5_mips.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-m68k/postgresql_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/postgresql-client_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/pgaccess_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/libpgperl_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/python-pygresql_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/postgresql-dev_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/libecpg3_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/libpgtcl_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/libpgsql2_7.2.1-2woody5_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody5_m68k.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-ia64/pgaccess_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/postgresql-client_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/libecpg3_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/postgresql-dev_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/libpgsql2_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/libpgperl_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/libpgtcl_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/postgresql_7.2.1-2woody5_ia64.deb stable/main/binary-ia64/python-pygresql_7.2.1-2woody5_ia64.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-hppa/pgaccess_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/libpgperl_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/python-pygresql_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/libecpg3_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/postgresql_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/postgresql-dev_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/libpgsql2_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/libpgtcl_7.2.1-2woody5_hppa.deb stable/main/binary-hppa/postgresql-client_7.2.1-2woody5_hppa.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-arm/libpgsql2_7.2.1-2woody5_arm.deb stable/main/binary-arm/libecpg3_7.2.1-2woody5_arm.deb stable/main/binary-arm/libpgperl_7.2.1-2woody5_arm.deb stable/main/binary-arm/libpgtcl_7.2.1-2woody5_arm.deb stable/main/binary-arm/postgresql_7.2.1-2woody5_arm.deb stable/main/binary-arm/pgaccess_7.2.1-2woody5_arm.deb stable/main/binary-arm/postgresql-client_7.2.1-2woody5_arm.deb stable/main/binary-arm/postgresql-contrib_7.2.1-2woody5_arm.deb stable/main/binary-arm/odbc-postgresql_7.2.1-2woody5_arm.deb stable/main/binary-arm/python-pygresql_7.2.1-2woody5_arm.deb stable/main/binary-arm/postgresql-dev_7.2.1-2woody5_arm.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/libpgsql2_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/python-pygresql_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/libpgtcl_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/libpgperl_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/postgresql-dev_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/pgaccess_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/postgresql_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/libecpg3_7.2.1-2woody5_alpha.deb stable/main/binary-alpha/postgresql-client_7.2.1-2woody5_alpha.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/source/postgresql_7.2.1-2woody5.dsc stable/main/binary-i386/python-pygresql_7.2.1-2woody5_i386.deb stable/main/binary-i386/libpgtcl_7.2.1-2woody5_i386.deb stable/main/binary-i386/odbc-postgresql_7.2.1-2woody5_i386.deb stable/main/binary-i386/postgresql-client_7.2.1-2woody5_i386.deb stable/main/binary-i386/postgresql_7.2.1-2woody5_i386.deb stable/main/binary-i386/libpgperl_7.2.1-2woody5_i386.deb stable/main/binary-i386/libecpg3_7.2.1-2woody5_i386.deb stable/main/source/postgresql_7.2.1-2woody5.diff.gz stable/main/binary-i386/postgresql-contrib_7.2.1-2woody5_i386.deb stable/main/binary-i386/pgaccess_7.2.1-2woody5_i386.deb stable/main/binary-i386/postgresql-dev_7.2.1-2woody5_i386.deb stable/main/binary-all/postgresql-doc_7.2.1-2woody5_all.deb stable/main/binary-i386/libpgsql2_7.2.1-2woody5_i386.deb postgresql (7.2.1-2woody5) stable-security; urgency=low * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/): added parameter for target buffer size to make_string() to prevent buffer overflows and corrected all calls to it. This fixes #247306 for woody (bug was already closed with the upload to sid). With previous versions it was possible to crash (and possibly exploit) e. g. apache if a PHP script connected to a ODBC database with very long credential strings (DSN, username, password, etc.). Other parts of postgresql are not affected. stable/main/binary-all/phpsysinfo_2.0-3woody1_all.deb stable/main/source/phpsysinfo_2.0-3woody1.diff.gz stable/main/source/phpsysinfo_2.0-3woody1.dsc phpsysinfo (2.0-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Avoid reading arbitrary files via relative pathnames in 'template' and 'lng' variables (CAN-2003-0536) stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody3.diff.gz stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody3_all.deb stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody3.dsc stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody3_all.deb stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody3_all.deb phpgroupware (0.9.14-0.RC3.2.woody3) stable-security; urgency=high * Security update Upstream security fixes until 0.9.14.007 - fix sql insertion in calendar and infolog - fix script file insertion via holiday files holiday files now must have extension txt, will automatically rename existing files in postinst - addenda to last security update (translations) Debian specific - fix world writable directories in created by phpgroupware.postinst (fixes bug 207797 in woody) * Change version number to indicate security inclusion of fixes at the request of phpgroupware people * Remove link /usr/share/phpgroupware/files, this is needed to fix vfs storage problem noted in CAN-2003-0599 and addressed by last security update. stable/main/binary-i386/php4-mcal_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-imap_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-cgi_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-gd_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-mhash_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-mysql_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-7.0.1_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-xslt_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-curl_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-ldap_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-snmp_4.1.2-7.0.1_i386.deb stable/main/binary-i386/php4-recode_4.1.2-7.0.1_i386.deb php4 (4:4.1.2-7.0.1) stable-security; urgency=low * Rebuild to get proper dependencies on php4-curl (closes: #260724) stable/main/binary-sparc/php4-gd_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-7_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-7_sparc.deb stable/main/binary-sparc/php4_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-imap_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-mysql_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-7_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-7_sparc.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-s390/php4_4.1.2-7_s390.deb stable/main/binary-s390/php4-imap_4.1.2-7_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-7_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-7_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-7_s390.deb stable/main/binary-s390/php4-mhash_4.1.2-7_s390.deb stable/main/binary-s390/php4-curl_4.1.2-7_s390.deb stable/main/binary-s390/php4-mcal_4.1.2-7_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-7_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-7_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-7_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-7_s390.deb stable/main/binary-s390/php4-gd_4.1.2-7_s390.deb stable/main/binary-s390/php4-recode_4.1.2-7_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-7_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-7_s390.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-powerpc/php4-mcal_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-7_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-gd_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.1.2-7_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.1.2-7_powerpc.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-mipsel/php4-mhash_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-recode_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-gd_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-7_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-7_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-7_mipsel.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-mips/php4-mhash_4.1.2-7_mips.deb stable/main/binary-mips/php4-curl_4.1.2-7_mips.deb stable/main/binary-mips/php4-gd_4.1.2-7_mips.deb stable/main/binary-mips/php4-sybase_4.1.2-7_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-7_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-7_mips.deb stable/main/binary-mips/php4_4.1.2-7_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-7_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-7_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-7_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-7_mips.deb stable/main/binary-mips/php4-imap_4.1.2-7_mips.deb stable/main/binary-mips/php4-cgi_4.1.2-7_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-7_mips.deb stable/main/binary-mips/php4-domxml_4.1.2-7_mips.deb stable/main/binary-mips/php4-recode_4.1.2-7_mips.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-m68k/php4-curl_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-sybase_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-7_m68k.deb stable/main/binary-m68k/php4_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-7_m68k.deb stable/main/binary-m68k/caudium-php4_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-7_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-7_m68k.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-ia64/php4-snmp_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-gd_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-7_ia64.deb stable/main/binary-ia64/php4_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-odbc_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-xslt_4.1.2-7_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-7_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-7_ia64.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-hppa/php4-mcal_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-7_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-gd_4.1.2-7_hppa.deb stable/main/binary-hppa/php4_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-sybase_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-imap_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-mysql_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-odbc_4.1.2-7_hppa.deb stable/main/binary-hppa/php4-cgi_4.1.2-7_hppa.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-arm/php4-mhash_4.1.2-7_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-7_arm.deb stable/main/binary-arm/php4-odbc_4.1.2-7_arm.deb stable/main/binary-arm/php4-gd_4.1.2-7_arm.deb stable/main/binary-arm/php4-recode_4.1.2-7_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-7_arm.deb stable/main/binary-arm/php4_4.1.2-7_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-7_arm.deb stable/main/binary-arm/php4-curl_4.1.2-7_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-7_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-7_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-7_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-7_arm.deb stable/main/binary-arm/php4-imap_4.1.2-7_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-7_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-7_arm.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-alpha/php4-imap_4.1.2-7_alpha.deb stable/main/binary-alpha/php4_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-mcal_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-7_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-mhash_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-ldap_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-7_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-7_alpha.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-i386/php4-recode_4.1.2-7_i386.deb stable/main/binary-i386/php4-cgi_4.1.2-7_i386.deb stable/main/binary-i386/php4-mcal_4.1.2-7_i386.deb stable/main/binary-i386/php4-imap_4.1.2-7_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-7_i386.deb stable/main/binary-i386/php4-ldap_4.1.2-7_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-7_i386.deb stable/main/binary-i386/php4-mhash_4.1.2-7_i386.deb stable/main/binary-i386/php4-mysql_4.1.2-7_i386.deb stable/main/binary-all/php4-dev_4.1.2-7_all.deb stable/main/source/php4_4.1.2-7.dsc stable/main/binary-all/php4-pear_4.1.2-7_all.deb stable/main/binary-i386/php4-curl_4.1.2-7_i386.deb stable/main/binary-i386/php4-snmp_4.1.2-7_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-7_i386.deb stable/main/binary-i386/php4_4.1.2-7_i386.deb stable/main/binary-i386/php4-gd_4.1.2-7_i386.deb stable/main/source/php4_4.1.2-7.diff.gz stable/main/binary-i386/php4-xslt_4.1.2-7_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-7_i386.deb php4 (4:4.1.2-7) stable-security; urgency=high * Backport of several security fixes from the 4.3 branch: - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685) - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8 - Improved stability during startup when memory_limit is used. - Replace alloca() with emalloc() for better stack protection. - Fixed strip_tags() to correctly handle '\0' characters. - NULLify appname and server_message on shutdown of SQL extensions - Added missing safe_mode checks inside itpc. stable/main/binary-sparc/libperl5.6_5.6.1-8.7_sparc.deb stable/main/binary-sparc/perl-debug_5.6.1-8.7_sparc.deb stable/main/binary-sparc/perl-base_5.6.1-8.7_sparc.deb stable/main/binary-sparc/libperl-dev_5.6.1-8.7_sparc.deb stable/main/binary-sparc/perl-suid_5.6.1-8.7_sparc.deb stable/main/binary-sparc/perl_5.6.1-8.7_sparc.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-s390/perl-base_5.6.1-8.7_s390.deb stable/main/binary-s390/libperl-dev_5.6.1-8.7_s390.deb stable/main/binary-s390/libperl5.6_5.6.1-8.7_s390.deb stable/main/binary-s390/perl_5.6.1-8.7_s390.deb stable/main/binary-s390/perl-suid_5.6.1-8.7_s390.deb stable/main/binary-s390/perl-debug_5.6.1-8.7_s390.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-powerpc/perl-suid_5.6.1-8.7_powerpc.deb stable/main/binary-powerpc/perl-debug_5.6.1-8.7_powerpc.deb stable/main/binary-powerpc/perl-base_5.6.1-8.7_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.6.1-8.7_powerpc.deb stable/main/binary-powerpc/perl_5.6.1-8.7_powerpc.deb stable/main/binary-powerpc/libperl5.6_5.6.1-8.7_powerpc.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-mipsel/perl_5.6.1-8.7_mipsel.deb stable/main/binary-mipsel/perl-base_5.6.1-8.7_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.6.1-8.7_mipsel.deb stable/main/binary-mipsel/perl-suid_5.6.1-8.7_mipsel.deb stable/main/binary-mipsel/perl-debug_5.6.1-8.7_mipsel.deb stable/main/binary-mipsel/libperl5.6_5.6.1-8.7_mipsel.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-mips/perl-base_5.6.1-8.7_mips.deb stable/main/binary-mips/perl-suid_5.6.1-8.7_mips.deb stable/main/binary-mips/perl-debug_5.6.1-8.7_mips.deb stable/main/binary-mips/libperl5.6_5.6.1-8.7_mips.deb stable/main/binary-mips/libperl-dev_5.6.1-8.7_mips.deb stable/main/binary-mips/perl_5.6.1-8.7_mips.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-m68k/perl_5.6.1-8.7_m68k.deb stable/main/binary-m68k/libperl5.6_5.6.1-8.7_m68k.deb stable/main/binary-m68k/perl-suid_5.6.1-8.7_m68k.deb stable/main/binary-m68k/libperl-dev_5.6.1-8.7_m68k.deb stable/main/binary-m68k/perl-base_5.6.1-8.7_m68k.deb stable/main/binary-m68k/perl-debug_5.6.1-8.7_m68k.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-ia64/perl-suid_5.6.1-8.7_ia64.deb stable/main/binary-ia64/libperl-dev_5.6.1-8.7_ia64.deb stable/main/binary-ia64/perl-base_5.6.1-8.7_ia64.deb stable/main/binary-ia64/perl-debug_5.6.1-8.7_ia64.deb stable/main/binary-ia64/libperl5.6_5.6.1-8.7_ia64.deb stable/main/binary-ia64/perl_5.6.1-8.7_ia64.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-hppa/libperl5.6_5.6.1-8.7_hppa.deb stable/main/binary-hppa/perl_5.6.1-8.7_hppa.deb stable/main/binary-hppa/perl-suid_5.6.1-8.7_hppa.deb stable/main/binary-hppa/perl-base_5.6.1-8.7_hppa.deb stable/main/binary-hppa/perl-debug_5.6.1-8.7_hppa.deb stable/main/binary-hppa/libperl-dev_5.6.1-8.7_hppa.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-arm/libperl5.6_5.6.1-8.7_arm.deb stable/main/binary-arm/perl-suid_5.6.1-8.7_arm.deb stable/main/binary-arm/perl_5.6.1-8.7_arm.deb stable/main/binary-arm/libperl-dev_5.6.1-8.7_arm.deb stable/main/binary-arm/perl-debug_5.6.1-8.7_arm.deb stable/main/binary-arm/perl-base_5.6.1-8.7_arm.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-alpha/perl-base_5.6.1-8.7_alpha.deb stable/main/binary-alpha/libperl-dev_5.6.1-8.7_alpha.deb stable/main/binary-alpha/perl_5.6.1-8.7_alpha.deb stable/main/binary-alpha/libperl5.6_5.6.1-8.7_alpha.deb stable/main/binary-alpha/perl-suid_5.6.1-8.7_alpha.deb stable/main/binary-alpha/perl-debug_5.6.1-8.7_alpha.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-all/perl-modules_5.6.1-8.7_all.deb stable/main/binary-i386/libperl-dev_5.6.1-8.7_i386.deb stable/main/binary-all/libcgi-fast-perl_5.6.1-8.7_all.deb stable/main/source/perl_5.6.1-8.7.dsc stable/main/binary-i386/perl_5.6.1-8.7_i386.deb stable/main/binary-all/perl-doc_5.6.1-8.7_all.deb stable/main/binary-i386/perl-debug_5.6.1-8.7_i386.deb stable/main/source/perl_5.6.1-8.7.diff.gz stable/main/binary-i386/perl-base_5.6.1-8.7_i386.deb stable/main/binary-i386/perl-suid_5.6.1-8.7_i386.deb stable/main/binary-i386/libperl5.6_5.6.1-8.7_i386.deb perl (5.6.1-8.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for CAN-2003-0618 stable/main/binary-sparc/osh_1.7-11woody1_sparc.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-s390/osh_1.7-11woody1_s390.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-powerpc/osh_1.7-11woody1_powerpc.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-mipsel/osh_1.7-11woody1_mipsel.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-mips/osh_1.7-11woody1_mips.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-m68k/osh_1.7-11woody1_m68k.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-ia64/osh_1.7-11woody1_ia64.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-hppa/osh_1.7-11woody1_hppa.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-arm/osh_1.7-11woody1_arm.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-alpha/osh_1.7-11woody1_alpha.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/source/osh_1.7-11woody1.dsc stable/main/source/osh_1.7-11woody1.diff.gz stable/main/binary-i386/osh_1.7-11woody1_i386.deb osh (1.7-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflows (#168383) stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.6_sparc.deb stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.6_sparc.deb stable/main/binary-sparc/openssl_0.9.6c-2.woody.6_sparc.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.6_s390.deb stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.6_s390.deb stable/main/binary-s390/openssl_0.9.6c-2.woody.6_s390.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.6_powerpc.deb stable/main/binary-powerpc/openssl_0.9.6c-2.woody.6_powerpc.deb stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.6_powerpc.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.6_mipsel.deb stable/main/binary-mipsel/openssl_0.9.6c-2.woody.6_mipsel.deb stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.6_mipsel.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.6_mips.deb stable/main/binary-mips/openssl_0.9.6c-2.woody.6_mips.deb stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.6_mips.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-m68k/openssl_0.9.6c-2.woody.6_m68k.deb stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.6_m68k.deb stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.6_m68k.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.6_ia64.deb stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.6_ia64.deb stable/main/binary-ia64/openssl_0.9.6c-2.woody.6_ia64.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.6_hppa.deb stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.6_hppa.deb stable/main/binary-hppa/openssl_0.9.6c-2.woody.6_hppa.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.6_arm.deb stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.6_arm.deb stable/main/binary-arm/openssl_0.9.6c-2.woody.6_arm.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.6_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.6_alpha.deb stable/main/binary-alpha/openssl_0.9.6c-2.woody.6_alpha.deb openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.6_i386.deb stable/main/binary-i386/openssl_0.9.6c-2.woody.6_i386.deb stable/main/source/openssl_0.9.6c-2.woody.6.dsc stable/main/binary-all/ssleay_0.9.6c-2.woody.6_all.deb stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.6_i386.deb stable/main/source/openssl_0.9.6c-2.woody.6.diff.gz openssl (0.9.6c-2.woody.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (infinite loop) (CAN-2004-0081) stable/main/binary-sparc/noffle_1.0.1-1.1.woody.2_sparc.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-s390/noffle_1.0.1-1.1.woody.2_s390.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-powerpc/noffle_1.0.1-1.1.woody.2_powerpc.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-mipsel/noffle_1.0.1-1.1.woody.2_mipsel.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-mips/noffle_1.0.1-1.1.woody.2_mips.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-m68k/noffle_1.0.1-1.1.woody.2_m68k.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-ia64/noffle_1.0.1-1.1.woody.2_ia64.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-hppa/noffle_1.0.1-1.1.woody.2_hppa.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-arm/noffle_1.0.1-1.1.woody.2_arm.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-alpha/noffle_1.0.1-1.1.woody.2_alpha.deb noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/source/noffle_1.0.1-1.1.woody.2.dsc stable/main/binary-i386/noffle_1.0.1-1.1.woody.2_i386.deb stable/main/source/noffle_1.0.1-1.1.woody.2.diff.gz noffle (1.0.1-1.1.woody.2) stable; urgency=medium * Let noffle switch to news:news on startup when root is calling, prevents root exploits and bad ownerships in the spool directory, e.g. when running 'noffle --query' as root, closes: #168128. stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody2_sparc.deb stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody2_sparc.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody2_s390.deb stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody2_s390.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody2_powerpc.deb stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody2_powerpc.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody2_mipsel.deb stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody2_mipsel.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody2_mips.deb stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody2_mips.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody2_m68k.deb stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody2_m68k.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody2_ia64.deb stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody2_ia64.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody2_hppa.deb stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody2_hppa.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody2_arm.deb stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody2_arm.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody2_alpha.deb stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody2_alpha.deb netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody2.dsc stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody2_i386.deb stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody2_i386.deb stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody2.diff.gz netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu. stable/main/binary-sparc/telnetd_0.17-18woody2_sparc.deb stable/main/binary-sparc/telnet_0.17-18woody2_sparc.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-s390/telnetd_0.17-18woody2_s390.deb stable/main/binary-s390/telnet_0.17-18woody2_s390.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-powerpc/telnet_0.17-18woody2_powerpc.deb stable/main/binary-powerpc/telnetd_0.17-18woody2_powerpc.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-mipsel/telnetd_0.17-18woody2_mipsel.deb stable/main/binary-mipsel/telnet_0.17-18woody2_mipsel.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-mips/telnetd_0.17-18woody2_mips.deb stable/main/binary-mips/telnet_0.17-18woody2_mips.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-m68k/telnet_0.17-18woody2_m68k.deb stable/main/binary-m68k/telnetd_0.17-18woody2_m68k.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-ia64/telnetd_0.17-18woody2_ia64.deb stable/main/binary-ia64/telnet_0.17-18woody2_ia64.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-hppa/telnetd_0.17-18woody2_hppa.deb stable/main/binary-hppa/telnet_0.17-18woody2_hppa.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-arm/telnet_0.17-18woody2_arm.deb stable/main/binary-arm/telnetd_0.17-18woody2_arm.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-alpha/telnet_0.17-18woody2_alpha.deb stable/main/binary-alpha/telnetd_0.17-18woody2_alpha.deb netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-i386/telnet_0.17-18woody2_i386.deb stable/main/source/netkit-telnet_0.17-18woody2.dsc stable/main/binary-i386/telnetd_0.17-18woody2_i386.deb stable/main/source/netkit-telnet_0.17-18woody2.diff.gz netkit-telnet (0.17-18woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Really applied the patch by Herbert Xu to fix DoS and possibly worse [telnetd/utility.c, CAN-2004-0911] stable/main/binary-sparc/nethack-common_3.4.0-3.0woody4_sparc.deb stable/main/binary-sparc/nethack-x11_3.4.0-3.0woody4_sparc.deb stable/main/binary-sparc/nethack-qt_3.4.0-3.0woody4_sparc.deb stable/main/binary-sparc/nethack-gnome_3.4.0-3.0woody4_sparc.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-s390/nethack-gnome_3.4.0-3.0woody4_s390.deb stable/main/binary-s390/nethack-qt_3.4.0-3.0woody4_s390.deb stable/main/binary-s390/nethack-common_3.4.0-3.0woody4_s390.deb stable/main/binary-s390/nethack-x11_3.4.0-3.0woody4_s390.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-powerpc/nethack-gnome_3.4.0-3.0woody4_powerpc.deb stable/main/binary-powerpc/nethack-common_3.4.0-3.0woody4_powerpc.deb stable/main/binary-powerpc/nethack-x11_3.4.0-3.0woody4_powerpc.deb stable/main/binary-powerpc/nethack-qt_3.4.0-3.0woody4_powerpc.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-mipsel/nethack-common_3.4.0-3.0woody4_mipsel.deb stable/main/binary-mipsel/nethack-qt_3.4.0-3.0woody4_mipsel.deb stable/main/binary-mipsel/nethack-x11_3.4.0-3.0woody4_mipsel.deb stable/main/binary-mipsel/nethack-gnome_3.4.0-3.0woody4_mipsel.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-mips/nethack-qt_3.4.0-3.0woody4_mips.deb stable/main/binary-mips/nethack-common_3.4.0-3.0woody4_mips.deb stable/main/binary-mips/nethack-gnome_3.4.0-3.0woody4_mips.deb stable/main/binary-mips/nethack-x11_3.4.0-3.0woody4_mips.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-m68k/nethack-x11_3.4.0-3.0woody4_m68k.deb stable/main/binary-m68k/nethack-common_3.4.0-3.0woody4_m68k.deb stable/main/binary-m68k/nethack-qt_3.4.0-3.0woody4_m68k.deb stable/main/binary-m68k/nethack-gnome_3.4.0-3.0woody4_m68k.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-hppa/nethack-qt_3.4.0-3.0woody4_hppa.deb stable/main/binary-hppa/nethack-x11_3.4.0-3.0woody4_hppa.deb stable/main/binary-hppa/nethack-common_3.4.0-3.0woody4_hppa.deb stable/main/binary-hppa/nethack-gnome_3.4.0-3.0woody4_hppa.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-arm/nethack-x11_3.4.0-3.0woody4_arm.deb stable/main/binary-arm/nethack-qt_3.4.0-3.0woody4_arm.deb stable/main/binary-arm/nethack-common_3.4.0-3.0woody4_arm.deb stable/main/binary-arm/nethack-gnome_3.4.0-3.0woody4_arm.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-alpha/nethack-common_3.4.0-3.0woody4_alpha.deb stable/main/binary-alpha/nethack-qt_3.4.0-3.0woody4_alpha.deb stable/main/binary-alpha/nethack-gnome_3.4.0-3.0woody4_alpha.deb stable/main/binary-alpha/nethack-x11_3.4.0-3.0woody4_alpha.deb nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-i386/nethack-gnome_3.4.0-3.0woody4_i386.deb stable/main/binary-i386/nethack-qt_3.4.0-3.0woody4_i386.deb stable/main/source/nethack_3.4.0-3.0woody4.diff.gz stable/main/binary-i386/nethack-common_3.4.0-3.0woody4_i386.deb stable/main/binary-i386/nethack-x11_3.4.0-3.0woody4_i386.deb stable/main/binary-all/nethack_3.4.0-3.0woody4_all.deb stable/main/source/nethack_3.4.0-3.0woody4.dsc nethack (3.4.0-3.0woody4) stable; urgency=medium * Stable upload; this upload is solely to recompile with gcc-3.0. * Add Build-Depends on gcc-3.0 to fix compiler issue that caused invisible doors on alpha architecture. (Closes: #71455) stable/main/binary-sparc/net-acct_0.71-5woody1_sparc.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-s390/net-acct_0.71-5woody1_s390.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-powerpc/net-acct_0.71-5woody1_powerpc.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-mipsel/net-acct_0.71-5woody1_mipsel.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-mips/net-acct_0.71-5woody1_mips.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-m68k/net-acct_0.71-5woody1_m68k.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-ia64/net-acct_0.71-5woody1_ia64.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-hppa/net-acct_0.71-5woody1_hppa.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-arm/net-acct_0.71-5woody1_arm.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-alpha/net-acct_0.71-5woody1_alpha.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/source/net-acct_0.71-5woody1.dsc stable/main/source/net-acct_0.71-5woody1.diff.gz stable/main/binary-i386/net-acct_0.71-5woody1_i386.deb net-acct (0.71-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Clark to remove insecure temporary file creation [src/process.c, CAN-2004-0851, http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch] stable/main/binary-sparc/libneon-dev_0.19.3-2woody5_sparc.deb stable/main/binary-sparc/libneon19_0.19.3-2woody5_sparc.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-s390/libneon-dev_0.19.3-2woody5_s390.deb stable/main/binary-s390/libneon19_0.19.3-2woody5_s390.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-powerpc/libneon-dev_0.19.3-2woody5_powerpc.deb stable/main/binary-powerpc/libneon19_0.19.3-2woody5_powerpc.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-mipsel/libneon-dev_0.19.3-2woody5_mipsel.deb stable/main/binary-mipsel/libneon19_0.19.3-2woody5_mipsel.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-mips/libneon-dev_0.19.3-2woody5_mips.deb stable/main/binary-mips/libneon19_0.19.3-2woody5_mips.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-m68k/libneon19_0.19.3-2woody5_m68k.deb stable/main/binary-m68k/libneon-dev_0.19.3-2woody5_m68k.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-ia64/libneon-dev_0.19.3-2woody5_ia64.deb stable/main/binary-ia64/libneon19_0.19.3-2woody5_ia64.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-hppa/libneon-dev_0.19.3-2woody5_hppa.deb stable/main/binary-hppa/libneon19_0.19.3-2woody5_hppa.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-arm/libneon19_0.19.3-2woody5_arm.deb stable/main/binary-arm/libneon-dev_0.19.3-2woody5_arm.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-alpha/libneon19_0.19.3-2woody5_alpha.deb stable/main/binary-alpha/libneon-dev_0.19.3-2woody5_alpha.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-i386/libneon19_0.19.3-2woody5_i386.deb stable/main/source/neon_0.19.3-2woody5.diff.gz stable/main/source/neon_0.19.3-2woody5.dsc stable/main/binary-i386/libneon-dev_0.19.3-2woody5_i386.deb neon (0.19.3-2woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied part of an upstream patch by Joe Orton to correct the weekdays buffer to properly fix a potential stack overflow via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398] stable/main/binary-sparc/nd_0.5.0-1woody1_sparc.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-s390/nd_0.5.0-1woody1_s390.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-powerpc/nd_0.5.0-1woody1_powerpc.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-mipsel/nd_0.5.0-1woody1_mipsel.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-mips/nd_0.5.0-1woody1_mips.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-m68k/nd_0.5.0-1woody1_m68k.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-ia64/nd_0.5.0-1woody1_ia64.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-hppa/nd_0.5.0-1woody1_hppa.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-arm/nd_0.5.0-1woody1_arm.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/binary-alpha/nd_0.5.0-1woody1_alpha.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/main/source/nd_0.5.0-1woody1.diff.gz stable/main/source/nd_0.5.0-1woody1.dsc stable/main/binary-i386/nd_0.5.0-1woody1_i386.deb nd (0.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patches from Fumitoshi UKAI to fix multiple buffer overflows in handling data from the remote server (CAN-2004-0014) [nd.c] stable/non-free/binary-sparc/ncompress_4.2.4-9.2_sparc.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-s390/ncompress_4.2.4-9.2_s390.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-powerpc/ncompress_4.2.4-9.2_powerpc.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-m68k/ncompress_4.2.4-9.2_m68k.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-ia64/ncompress_4.2.4-9.2_ia64.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-hppa/ncompress_4.2.4-9.2_hppa.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-arm/ncompress_4.2.4-9.2_arm.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-alpha/ncompress_4.2.4-9.2_alpha.deb ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/non-free/binary-i386/ncompress_4.2.4-9.2_i386.deb stable/non-free/source/ncompress_4.2.4-9.2.dsc stable/non-free/source/ncompress_4.2.4-9.2.diff.gz ncompress (4.2.4-9.2) stable; urgency=high * Disallow maxbits less than 10, to avoid data corruption (closes: #220820). stable/main/binary-sparc/nbd-server_1.2cvs20020320-3.woody.2_sparc.deb stable/main/binary-sparc/nbd-client_1.2cvs20020320-3.woody.2_sparc.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-s390/nbd-client_1.2cvs20020320-3.woody.2_s390.deb stable/main/binary-s390/nbd-server_1.2cvs20020320-3.woody.2_s390.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-powerpc/nbd-server_1.2cvs20020320-3.woody.2_powerpc.deb stable/main/binary-powerpc/nbd-client_1.2cvs20020320-3.woody.2_powerpc.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-mipsel/nbd-server_1.2cvs20020320-3.woody.2_mipsel.deb stable/main/binary-mipsel/nbd-client_1.2cvs20020320-3.woody.2_mipsel.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-mips/nbd-server_1.2cvs20020320-3.woody.2_mips.deb stable/main/binary-mips/nbd-client_1.2cvs20020320-3.woody.2_mips.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-m68k/nbd-client_1.2cvs20020320-3.woody.2_m68k.deb stable/main/binary-m68k/nbd-server_1.2cvs20020320-3.woody.2_m68k.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-ia64/nbd-server_1.2cvs20020320-3.woody.2_ia64.deb stable/main/binary-ia64/nbd-client_1.2cvs20020320-3.woody.2_ia64.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-hppa/nbd-server_1.2cvs20020320-3.woody.2_hppa.deb stable/main/binary-hppa/nbd-client_1.2cvs20020320-3.woody.2_hppa.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-arm/nbd-server_1.2cvs20020320-3.woody.2_arm.deb stable/main/binary-arm/nbd-client_1.2cvs20020320-3.woody.2_arm.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-alpha/nbd-client_1.2cvs20020320-3.woody.2_alpha.deb stable/main/binary-alpha/nbd-server_1.2cvs20020320-3.woody.2_alpha.deb nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/source/nbd_1.2cvs20020320-3.woody.2.dsc stable/main/binary-i386/nbd-server_1.2cvs20020320-3.woody.2_i386.deb stable/main/binary-i386/nbd-client_1.2cvs20020320-3.woody.2_i386.deb stable/main/source/nbd_1.2cvs20020320-3.woody.2.diff.gz nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low * Remove temporary files in nbd-server's postinst stable/main/binary-sparc/mysql-server_3.23.49-8.8_sparc.deb stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.8_sparc.deb stable/main/binary-sparc/libmysqlclient10_3.23.49-8.8_sparc.deb stable/main/binary-sparc/mysql-client_3.23.49-8.8_sparc.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-s390/mysql-server_3.23.49-8.8_s390.deb stable/main/binary-s390/libmysqlclient10_3.23.49-8.8_s390.deb stable/main/binary-s390/mysql-client_3.23.49-8.8_s390.deb stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.8_s390.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.8_powerpc.deb stable/main/binary-powerpc/mysql-client_3.23.49-8.8_powerpc.deb stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.8_powerpc.deb stable/main/binary-powerpc/mysql-server_3.23.49-8.8_powerpc.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.8_mipsel.deb stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.8_mipsel.deb stable/main/binary-mipsel/mysql-server_3.23.49-8.8_mipsel.deb stable/main/binary-mipsel/mysql-client_3.23.49-8.8_mipsel.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-mips/mysql-client_3.23.49-8.8_mips.deb stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.8_mips.deb stable/main/binary-mips/libmysqlclient10_3.23.49-8.8_mips.deb stable/main/binary-mips/mysql-server_3.23.49-8.8_mips.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.8_m68k.deb stable/main/binary-m68k/mysql-client_3.23.49-8.8_m68k.deb stable/main/binary-m68k/mysql-server_3.23.49-8.8_m68k.deb stable/main/binary-m68k/libmysqlclient10_3.23.49-8.8_m68k.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-ia64/libmysqlclient10_3.23.49-8.8_ia64.deb stable/main/binary-ia64/mysql-client_3.23.49-8.8_ia64.deb stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.8_ia64.deb stable/main/binary-ia64/mysql-server_3.23.49-8.8_ia64.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-hppa/mysql-client_3.23.49-8.8_hppa.deb stable/main/binary-hppa/libmysqlclient10_3.23.49-8.8_hppa.deb stable/main/binary-hppa/mysql-server_3.23.49-8.8_hppa.deb stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.8_hppa.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-arm/mysql-server_3.23.49-8.8_arm.deb stable/main/binary-arm/mysql-client_3.23.49-8.8_arm.deb stable/main/binary-arm/libmysqlclient10_3.23.49-8.8_arm.deb stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.8_arm.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-alpha/mysql-client_3.23.49-8.8_alpha.deb stable/main/binary-alpha/mysql-server_3.23.49-8.8_alpha.deb stable/main/binary-alpha/libmysqlclient10_3.23.49-8.8_alpha.deb stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.8_alpha.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/source/mysql_3.23.49-8.8.diff.gz stable/main/binary-i386/libmysqlclient10_3.23.49-8.8_i386.deb stable/main/source/mysql_3.23.49-8.8.dsc stable/main/binary-i386/mysql-server_3.23.49-8.8_i386.deb stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.8_i386.deb stable/main/binary-all/mysql-common_3.23.49-8.8_all.deb stable/main/binary-i386/mysql-client_3.23.49-8.8_i386.deb mysql (3.23.49-8.8) stable-security; urgency=high * Maintainer upload by the Security Team * Applied patch to make mysqlhotcopy working again as it was broken by the upstream patch for the security problem fixed in 3.23.49-8.7 [DSA 540 and CAN-2004-0457] * Applied patch to fix a minor privilege escalation possibility in the "ALTER TABLE ... RENAME" command. [http://bugs.mysql.com/3270, CAN-2004-0835] * Applied patch to fix a potential memory overrun in mysql_real_connect() (which required a compromised DNS server and certain operating systems). [http://bugs.mysql.com/4017, CAN-2004-0836] * Applied patch to fix a bug that could have resulted in a crash or hang of the server if concurrent accesses to MERGE tables (even one MERGE table and MyISAM tables) were used, [http://bugs.mysql.com/2408, CAN-2004-0837] stable/main/binary-sparc/mpg321_0.2.10.2_sparc.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-s390/mpg321_0.2.10.2_s390.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-powerpc/mpg321_0.2.10.2_powerpc.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-mipsel/mpg321_0.2.10.2_mipsel.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-mips/mpg321_0.2.10.2_mips.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-m68k/mpg321_0.2.10.2_m68k.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-ia64/mpg321_0.2.10.2_ia64.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-hppa/mpg321_0.2.10.2_hppa.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-arm/mpg321_0.2.10.2_arm.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/binary-alpha/mpg321_0.2.10.2_alpha.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/main/source/mpg321_0.2.10.2.dsc stable/main/source/mpg321_0.2.10.2.tar.gz stable/main/binary-i386/mpg321_0.2.10.2_i386.deb mpg321 (0.2.10.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerabilities (CAN-2003-0969) [mpg321.c] stable/non-free/binary-powerpc/mpg123_0.59r-13woody3_powerpc.deb stable/non-free/binary-alpha/mpg123-esd_0.59r-13woody3_alpha.deb stable/non-free/binary-i386/mpg123-esd_0.59r-13woody3_i386.deb stable/non-free/binary-sparc/mpg123_0.59r-13woody3_sparc.deb stable/non-free/source/mpg123_0.59r-13woody3.diff.gz stable/non-free/binary-i386/mpg123-oss-3dnow_0.59r-13woody3_i386.deb stable/non-free/source/mpg123_0.59r-13woody3.dsc stable/non-free/binary-i386/mpg123_0.59r-13woody3_i386.deb stable/non-free/binary-i386/mpg123-nas_0.59r-13woody3_i386.deb stable/non-free/binary-arm/mpg123_0.59r-13woody3_arm.deb stable/non-free/binary-m68k/mpg123_0.59r-13woody3_m68k.deb stable/non-free/binary-hppa/mpg123_0.59r-13woody3_hppa.deb stable/non-free/binary-alpha/mpg123_0.59r-13woody3_alpha.deb stable/non-free/binary-powerpc/mpg123-esd_0.59r-13woody3_powerpc.deb stable/non-free/binary-i386/mpg123-oss-i486_0.59r-13woody3_i386.deb mpg123 (0.59r-13woody3) stable-security; urgency=high * layer2.c: Fix buffer overflow in layer2 decoder (CVE ID CAN-2004-0805). stable/main/binary-sparc/libapache-mod-auth-shadow_1.3-3.1woody.1_sparc.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-s390/libapache-mod-auth-shadow_1.3-3.1woody.1_s390.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-powerpc/libapache-mod-auth-shadow_1.3-3.1woody.1_powerpc.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-mipsel/libapache-mod-auth-shadow_1.3-3.1woody.1_mipsel.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-mips/libapache-mod-auth-shadow_1.3-3.1woody.1_mips.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-m68k/libapache-mod-auth-shadow_1.3-3.1woody.1_m68k.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-ia64/libapache-mod-auth-shadow_1.3-3.1woody.1_ia64.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-hppa/libapache-mod-auth-shadow_1.3-3.1woody.1_hppa.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-arm/libapache-mod-auth-shadow_1.3-3.1woody.1_arm.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-alpha/libapache-mod-auth-shadow_1.3-3.1woody.1_alpha.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/source/mod-auth-shadow_1.3-3.1woody.1.dsc stable/main/source/mod-auth-shadow_1.3-3.1woody.1.diff.gz stable/main/binary-i386/libapache-mod-auth-shadow_1.3-3.1woody.1_i386.deb mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high * Add missing password and account expiration checks to validate.c (CAN-2004-0041) stable/main/binary-sparc/libmm11-dev_1.1.3-6.2_sparc.deb stable/main/binary-sparc/libmm11_1.1.3-6.2_sparc.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-s390/libmm11-dev_1.1.3-6.2_s390.deb stable/main/binary-s390/libmm11_1.1.3-6.2_s390.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-powerpc/libmm11-dev_1.1.3-6.2_powerpc.deb stable/main/binary-powerpc/libmm11_1.1.3-6.2_powerpc.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-mipsel/libmm11-dev_1.1.3-6.2_mipsel.deb stable/main/binary-mipsel/libmm11_1.1.3-6.2_mipsel.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-mips/libmm11-dev_1.1.3-6.2_mips.deb stable/main/binary-mips/libmm11_1.1.3-6.2_mips.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-m68k/libmm11_1.1.3-6.2_m68k.deb stable/main/binary-m68k/libmm11-dev_1.1.3-6.2_m68k.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-ia64/libmm11-dev_1.1.3-6.2_ia64.deb stable/main/binary-ia64/libmm11_1.1.3-6.2_ia64.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-hppa/libmm11-dev_1.1.3-6.2_hppa.deb stable/main/binary-hppa/libmm11_1.1.3-6.2_hppa.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-arm/libmm11_1.1.3-6.2_arm.deb stable/main/binary-arm/libmm11-dev_1.1.3-6.2_arm.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-alpha/libmm11_1.1.3-6.2_alpha.deb stable/main/binary-alpha/libmm11-dev_1.1.3-6.2_alpha.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/source/mm_1.1.3-6.2.diff.gz stable/main/source/mm_1.1.3-6.2.dsc stable/main/binary-i386/libmm11_1.1.3-6.2_i386.deb stable/main/binary-i386/libmm11-dev_1.1.3-6.2_i386.deb mm (1.1.3-6.2) stable; urgency=low * Force the use of MMFILE shared memory. This should fix segfault problems with PHP4 on some architectures (closes: #136261). stable/main/binary-sparc/metamail_2.7-45woody.3_sparc.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-s390/metamail_2.7-45woody.3_s390.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-powerpc/metamail_2.7-45woody.3_powerpc.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-mipsel/metamail_2.7-45woody.3_mipsel.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-mips/metamail_2.7-45woody.3_mips.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-m68k/metamail_2.7-45woody.3_m68k.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-ia64/metamail_2.7-45woody.3_ia64.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-hppa/metamail_2.7-45woody.3_hppa.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-arm/metamail_2.7-45woody.3_arm.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-alpha/metamail_2.7-45woody.3_alpha.deb metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/source/metamail_2.7-45woody.3.dsc stable/main/binary-i386/metamail_2.7-45woody.3_i386.deb stable/main/source/metamail_2.7-45woody.3.diff.gz metamail (2.7-45woody.3) stable; urgency=medium * Non-maintainer upload by the Security Team * Adjust the patch since Christian 'Naddy' Weisgerber discovered an overzealous use of sizeof(). * Only upload to proposed-updates since the problem doesn't seem to break too much stable/main/binary-sparc/mc_4.5.55-1.2woody3_sparc.deb stable/main/binary-sparc/gmc_4.5.55-1.2woody3_sparc.deb stable/main/binary-sparc/mc-common_4.5.55-1.2woody3_sparc.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-s390/mc_4.5.55-1.2woody3_s390.deb stable/main/binary-s390/gmc_4.5.55-1.2woody3_s390.deb stable/main/binary-s390/mc-common_4.5.55-1.2woody3_s390.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-powerpc/mc_4.5.55-1.2woody3_powerpc.deb stable/main/binary-powerpc/gmc_4.5.55-1.2woody3_powerpc.deb stable/main/binary-powerpc/mc-common_4.5.55-1.2woody3_powerpc.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-mipsel/gmc_4.5.55-1.2woody3_mipsel.deb stable/main/binary-mipsel/mc_4.5.55-1.2woody3_mipsel.deb stable/main/binary-mipsel/mc-common_4.5.55-1.2woody3_mipsel.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-mips/gmc_4.5.55-1.2woody3_mips.deb stable/main/binary-mips/mc-common_4.5.55-1.2woody3_mips.deb stable/main/binary-mips/mc_4.5.55-1.2woody3_mips.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-m68k/mc_4.5.55-1.2woody3_m68k.deb stable/main/binary-m68k/mc-common_4.5.55-1.2woody3_m68k.deb stable/main/binary-m68k/gmc_4.5.55-1.2woody3_m68k.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-ia64/gmc_4.5.55-1.2woody3_ia64.deb stable/main/binary-ia64/mc_4.5.55-1.2woody3_ia64.deb stable/main/binary-ia64/mc-common_4.5.55-1.2woody3_ia64.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-hppa/mc-common_4.5.55-1.2woody3_hppa.deb stable/main/binary-hppa/gmc_4.5.55-1.2woody3_hppa.deb stable/main/binary-hppa/mc_4.5.55-1.2woody3_hppa.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-arm/mc-common_4.5.55-1.2woody3_arm.deb stable/main/binary-arm/gmc_4.5.55-1.2woody3_arm.deb stable/main/binary-arm/mc_4.5.55-1.2woody3_arm.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-alpha/mc-common_4.5.55-1.2woody3_alpha.deb stable/main/binary-alpha/gmc_4.5.55-1.2woody3_alpha.deb stable/main/binary-alpha/mc_4.5.55-1.2woody3_alpha.deb mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/binary-i386/mc_4.5.55-1.2woody3_i386.deb stable/main/binary-i386/mc-common_4.5.55-1.2woody3_i386.deb stable/main/binary-i386/gmc_4.5.55-1.2woody3_i386.deb stable/main/source/mc_4.5.55-1.2woody3.dsc stable/main/source/mc_4.5.55-1.2woody3.diff.gz mc (4.5.55-1.2woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied (and backported) corrections by Jakub Jelinek to fix buffer overflows (CAN-2004-0226), a format string vulnerability (CAN-2004-0232) and some insecure temporary file creations (CAN-2004-0231) [52_security_CAN-2004-0226.diff] stable/main/source/mailreader_2.3.29-5woody1.dsc stable/main/binary-all/mailreader_2.3.29-5woody1_all.deb stable/main/source/mailreader_2.3.29-5woody1.diff.gz mailreader (2.3.29-5woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from Maurizio Lemmo - Tannoiser to fix CAN-2002-1581: Directory traversal vulnerability in nph-mr.cgi allows remote attackers to view arbitrary files via .. (dot dot) sequences and a null byte (%00) in the configLanguage parameter stable/main/binary-sparc/mailman_2.0.11-1woody8_sparc.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-s390/mailman_2.0.11-1woody8_s390.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-powerpc/mailman_2.0.11-1woody8_powerpc.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-mipsel/mailman_2.0.11-1woody8_mipsel.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-mips/mailman_2.0.11-1woody8_mips.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-m68k/mailman_2.0.11-1woody8_m68k.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-ia64/mailman_2.0.11-1woody8_ia64.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-hppa/mailman_2.0.11-1woody8_hppa.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-arm/mailman_2.0.11-1woody8_arm.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-alpha/mailman_2.0.11-1woody8_alpha.deb mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/source/mailman_2.0.11-1woody8.dsc stable/main/binary-i386/mailman_2.0.11-1woody8_i386.deb stable/main/source/mailman_2.0.11-1woody8.diff.gz mailman (2.0.11-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages with no Subject header at all (Closes: #232079) stable/main/binary-sparc/mah-jong_1.4-3_sparc.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-s390/mah-jong_1.4-3_s390.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-powerpc/mah-jong_1.4-3_powerpc.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-mipsel/mah-jong_1.4-3_mipsel.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-mips/mah-jong_1.4-3_mips.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-m68k/mah-jong_1.4-3_m68k.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-ia64/mah-jong_1.4-3_ia64.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-hppa/mah-jong_1.4-3_hppa.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-arm/mah-jong_1.4-3_arm.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-alpha/mah-jong_1.4-3_alpha.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/source/mah-jong_1.4-3.dsc stable/main/source/mah-jong_1.4-3.diff.gz stable/main/binary-i386/mah-jong_1.4-3_i386.deb mah-jong (1.4-3) stable-security; urgency=high * Fix a denial of service: the server used to segfault when a client connected with an empty name. (Fix backported from version 1.6.1.) [controller.c, CAN-2004-0458] stable/main/binary-sparc/lynx_2.8.4.1b-3.2_sparc.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-s390/lynx_2.8.4.1b-3.2_s390.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-powerpc/lynx_2.8.4.1b-3.2_powerpc.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-mipsel/lynx_2.8.4.1b-3.2_mipsel.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-mips/lynx_2.8.4.1b-3.2_mips.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-m68k/lynx_2.8.4.1b-3.2_m68k.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-ia64/lynx_2.8.4.1b-3.2_ia64.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-hppa/lynx_2.8.4.1b-3.2_hppa.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-arm/lynx_2.8.4.1b-3.2_arm.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/binary-alpha/lynx_2.8.4.1b-3.2_alpha.deb lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. stable/main/source/lynx_2.8.4.1b-3.2.diff.gz stable/main/binary-i386/lynx_2.8.4.1b-3.2_i386.deb stable/main/source/lynx_2.8.4.1b-3.2.dsc lynx (2.8.4.1b-3.2) stable-security; urgency=high * Non-maintainer upload by security team * Really apply the patch instead of only documenting it. doh. lynx (2.8.4.1b-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Merge patch from SCO advisory CSSA-2002-049.0 (but without the bits that create backup files). This fixes handling of CRLF in external URLs. stable/main/binary-sparc/lxr_0.3-3_sparc.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-s390/lxr_0.3-3_s390.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-powerpc/lxr_0.3-3_powerpc.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-mipsel/lxr_0.3-3_mipsel.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-mips/lxr_0.3-3_mips.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-m68k/lxr_0.3-3_m68k.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-ia64/lxr_0.3-3_ia64.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-i386/lxr_0.3-3_i386.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-hppa/lxr_0.3-3_hppa.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-alpha/lxr_0.3-3_alpha.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/source/lxr_0.3-3.diff.gz stable/main/source/lxr_0.3-3.dsc stable/main/binary-arm/lxr_0.3-3_arm.deb lxr (0.3-3) stable-security; urgency=high * Applied an upstream patch to not allow remote users to read all files stable/main/binary-sparc/lvm10_1.0.4-5woody1_sparc.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-s390/lvm10_1.0.4-5woody1_s390.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-powerpc/lvm10_1.0.4-5woody1_powerpc.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-mipsel/lvm10_1.0.4-5woody1_mipsel.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-mips/lvm10_1.0.4-5woody1_mips.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-m68k/lvm10_1.0.4-5woody1_m68k.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-ia64/lvm10_1.0.4-5woody1_ia64.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-hppa/lvm10_1.0.4-5woody1_hppa.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-arm/lvm10_1.0.4-5woody1_arm.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-alpha/lvm10_1.0.4-5woody1_alpha.deb lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-i386/lvm10_1.0.4-5woody1_i386.deb stable/main/source/lvm10_1.0.4-5woody1.dsc stable/main/source/lvm10_1.0.4-5woody1.diff.gz lvm10 (1:1.0.4-5woody1) stable; urgency=medium * Fix bug in vgimport that could prevent volume groups with out-of-sequence PV numbers from being imported. Since PV can get out-of-sequence quite easily this can potentially make vgexport a disasterous operation. stable/main/binary-sparc/lukemftpd_1.1-1woody2_sparc.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-s390/lukemftpd_1.1-1woody2_s390.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-powerpc/lukemftpd_1.1-1woody2_powerpc.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-mipsel/lukemftpd_1.1-1woody2_mipsel.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-mips/lukemftpd_1.1-1woody2_mips.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-m68k/lukemftpd_1.1-1woody2_m68k.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-ia64/lukemftpd_1.1-1woody2_ia64.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-i386/lukemftpd_1.1-1woody2_i386.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-arm/lukemftpd_1.1-1woody2_arm.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-alpha/lukemftpd_1.1-1woody2_alpha.deb lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/source/lukemftpd_1.1-1woody2.diff.gz stable/main/binary-hppa/lukemftpd_1.1-1woody2_hppa.deb stable/main/source/lukemftpd_1.1-1woody2.dsc lukemftpd (1.1-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken OOB handling which could be used to execute arbitrary code [src/ftpd.c, CAN-2004-0794] stable/main/binary-sparc/lpr-ppd_0.72-2.1_sparc.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-s390/lpr-ppd_0.72-2.1_s390.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-powerpc/lpr-ppd_0.72-2.1_powerpc.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-mipsel/lpr-ppd_0.72-2.1_mipsel.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-mips/lpr-ppd_0.72-2.1_mips.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-ia64/lpr-ppd_0.72-2.1_ia64.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-i386/lpr-ppd_0.72-2.1_i386.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-hppa/lpr-ppd_0.72-2.1_hppa.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-arm/lpr-ppd_0.72-2.1_arm.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-alpha/lpr-ppd_0.72-2.1_alpha.deb lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/source/lpr-ppd_0.72-2.1.dsc stable/main/binary-m68k/lpr-ppd_0.72-2.1_m68k.deb stable/main/source/lpr-ppd_0.72-2.1.diff.gz lpr-ppd (1:0.72-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access (CAN-2003-0144) stable/main/binary-s390/lpr_2000.05.07-4.3_s390.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-powerpc/lpr_2000.05.07-4.3_powerpc.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-mipsel/lpr_2000.05.07-4.3_mipsel.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-mips/lpr_2000.05.07-4.3_mips.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-m68k/lpr_2000.05.07-4.3_m68k.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-ia64/lpr_2000.05.07-4.3_ia64.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-i386/lpr_2000.05.07-4.3_i386.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-hppa/lpr_2000.05.07-4.3_hppa.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-arm/lpr_2000.05.07-4.3_arm.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-alpha/lpr_2000.05.07-4.3_alpha.deb lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/binary-sparc/lpr_2000.05.07-4.3_sparc.deb stable/main/source/lpr_2000.05.07-4.3.diff.gz stable/main/source/lpr_2000.05.07-4.3.dsc lpr (1:2000.05.07-4.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from SuSE to fix buffer overvlow and arbitrary file access stable/main/source/logcheck_1.1.1-13.1woody2.diff.gz stable/main/binary-all/logcheck-database_1.1.1-13.1woody2_all.deb stable/main/source/logcheck_1.1.1-13.1woody2.dsc stable/main/binary-all/logtail_1.1.1-13.1woody2_all.deb stable/main/binary-all/logcheck_1.1.1-13.1woody2_all.deb logcheck (1.1.1-13.1woody2) stable; urgency=low * Important one-line fix for non-interactive debconf frontend which broke apt installs for other packages, too (closes: #244511) stable/main/binary-sparc/log2mail_0.2.5.2_sparc.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-s390/log2mail_0.2.5.2_s390.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-powerpc/log2mail_0.2.5.2_powerpc.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-mipsel/log2mail_0.2.5.2_mipsel.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-mips/log2mail_0.2.5.2_mips.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-m68k/log2mail_0.2.5.2_m68k.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-ia64/log2mail_0.2.5.2_ia64.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-hppa/log2mail_0.2.5.2_hppa.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-arm/log2mail_0.2.5.2_arm.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-alpha/log2mail_0.2.5.2_alpha.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/source/log2mail_0.2.5.2.dsc stable/main/source/log2mail_0.2.5.2.tar.gz stable/main/binary-i386/log2mail_0.2.5.2_i386.deb log2mail (0.2.5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string bug in printlog() (CAN-2004-0450) stable/main/binary-sparc/libxslt1_1.0.16-0.2_sparc.deb stable/main/binary-sparc/libxslt1-dev_1.0.16-0.2_sparc.deb stable/main/binary-sparc/xsltproc_1.0.16-0.2_sparc.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-s390/libxslt1_1.0.16-0.2_s390.deb stable/main/binary-s390/libxslt1-dev_1.0.16-0.2_s390.deb stable/main/binary-s390/xsltproc_1.0.16-0.2_s390.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-powerpc/libxslt1_1.0.16-0.2_powerpc.deb stable/main/binary-powerpc/libxslt1-dev_1.0.16-0.2_powerpc.deb stable/main/binary-powerpc/xsltproc_1.0.16-0.2_powerpc.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-mipsel/libxslt1_1.0.16-0.2_mipsel.deb stable/main/binary-mipsel/libxslt1-dev_1.0.16-0.2_mipsel.deb stable/main/binary-mipsel/xsltproc_1.0.16-0.2_mipsel.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-mips/xsltproc_1.0.16-0.2_mips.deb stable/main/binary-mips/libxslt1-dev_1.0.16-0.2_mips.deb stable/main/binary-mips/libxslt1_1.0.16-0.2_mips.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-m68k/xsltproc_1.0.16-0.2_m68k.deb stable/main/binary-m68k/libxslt1_1.0.16-0.2_m68k.deb stable/main/binary-m68k/libxslt1-dev_1.0.16-0.2_m68k.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-ia64/xsltproc_1.0.16-0.2_ia64.deb stable/main/binary-ia64/libxslt1-dev_1.0.16-0.2_ia64.deb stable/main/binary-ia64/libxslt1_1.0.16-0.2_ia64.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-hppa/libxslt1-dev_1.0.16-0.2_hppa.deb stable/main/binary-hppa/xsltproc_1.0.16-0.2_hppa.deb stable/main/binary-hppa/libxslt1_1.0.16-0.2_hppa.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-arm/xsltproc_1.0.16-0.2_arm.deb stable/main/binary-arm/libxslt1-dev_1.0.16-0.2_arm.deb stable/main/binary-arm/libxslt1_1.0.16-0.2_arm.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-alpha/xsltproc_1.0.16-0.2_alpha.deb stable/main/binary-alpha/libxslt1-dev_1.0.16-0.2_alpha.deb stable/main/binary-alpha/libxslt1_1.0.16-0.2_alpha.deb libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-i386/libxslt1_1.0.16-0.2_i386.deb stable/main/binary-i386/libxslt1-dev_1.0.16-0.2_i386.deb stable/main/binary-i386/xsltproc_1.0.16-0.2_i386.deb stable/main/source/libxslt_1.0.16-0.2.diff.gz stable/main/source/libxslt_1.0.16-0.2.dsc libxslt (1.0.16-0.2) stable; urgency=low * Include xsltInternals.h in transform.h, or else compilation might fail. Thanks to Marcel Meckel for reporting this. stable/main/binary-sparc/libxml2_2.4.19-4woody1_sparc.deb stable/main/binary-sparc/libxml2-dev_2.4.19-4woody1_sparc.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-s390/libxml2_2.4.19-4woody1_s390.deb stable/main/binary-s390/libxml2-dev_2.4.19-4woody1_s390.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-powerpc/libxml2_2.4.19-4woody1_powerpc.deb stable/main/binary-powerpc/libxml2-dev_2.4.19-4woody1_powerpc.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-mipsel/libxml2_2.4.19-4woody1_mipsel.deb stable/main/binary-mipsel/libxml2-dev_2.4.19-4woody1_mipsel.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-mips/libxml2_2.4.19-4woody1_mips.deb stable/main/binary-mips/libxml2-dev_2.4.19-4woody1_mips.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-m68k/libxml2-dev_2.4.19-4woody1_m68k.deb stable/main/binary-m68k/libxml2_2.4.19-4woody1_m68k.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-ia64/libxml2_2.4.19-4woody1_ia64.deb stable/main/binary-ia64/libxml2-dev_2.4.19-4woody1_ia64.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-hppa/libxml2_2.4.19-4woody1_hppa.deb stable/main/binary-hppa/libxml2-dev_2.4.19-4woody1_hppa.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-arm/libxml2-dev_2.4.19-4woody1_arm.deb stable/main/binary-arm/libxml2_2.4.19-4woody1_arm.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-alpha/libxml2-dev_2.4.19-4woody1_alpha.deb stable/main/binary-alpha/libxml2_2.4.19-4woody1_alpha.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-i386/libxml2-dev_2.4.19-4woody1_i386.deb stable/main/source/libxml2_2.4.19-4woody1.dsc stable/main/source/libxml2_2.4.19-4woody1.diff.gz stable/main/binary-i386/libxml2_2.4.19-4woody1_i386.deb libxml2 (2.4.19-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-sparc/libxml1_1.8.17-2woody1_sparc.deb stable/main/binary-sparc/libxml-dev_1.8.17-2woody1_sparc.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-s390/libxml1_1.8.17-2woody1_s390.deb stable/main/binary-s390/libxml-dev_1.8.17-2woody1_s390.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-powerpc/libxml1_1.8.17-2woody1_powerpc.deb stable/main/binary-powerpc/libxml-dev_1.8.17-2woody1_powerpc.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-mipsel/libxml1_1.8.17-2woody1_mipsel.deb stable/main/binary-mipsel/libxml-dev_1.8.17-2woody1_mipsel.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-mips/libxml1_1.8.17-2woody1_mips.deb stable/main/binary-mips/libxml-dev_1.8.17-2woody1_mips.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-m68k/libxml-dev_1.8.17-2woody1_m68k.deb stable/main/binary-m68k/libxml1_1.8.17-2woody1_m68k.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-ia64/libxml1_1.8.17-2woody1_ia64.deb stable/main/binary-ia64/libxml-dev_1.8.17-2woody1_ia64.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-hppa/libxml1_1.8.17-2woody1_hppa.deb stable/main/binary-hppa/libxml-dev_1.8.17-2woody1_hppa.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-arm/libxml-dev_1.8.17-2woody1_arm.deb stable/main/binary-arm/libxml1_1.8.17-2woody1_arm.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-alpha/libxml-dev_1.8.17-2woody1_alpha.deb stable/main/binary-alpha/libxml1_1.8.17-2woody1_alpha.deb libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-i386/libxml-dev_1.8.17-2woody1_i386.deb stable/main/binary-i386/libxml1_1.8.17-2woody1_i386.deb stable/main/source/libxml_1.8.17-2woody1.diff.gz stable/main/source/libxml_1.8.17-2woody1.dsc libxml (1:1.8.17-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by upstream Daniel Veillard to fix buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110] stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.9_sparc.deb stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.9_sparc.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.9_s390.deb stable/main/binary-s390/libpng3_1.2.1-1.1.woody.9_s390.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.9_powerpc.deb stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.9_powerpc.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.9_mipsel.deb stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.9_mipsel.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.9_mips.deb stable/main/binary-mips/libpng3_1.2.1-1.1.woody.9_mips.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.9_m68k.deb stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.9_m68k.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.9_ia64.deb stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.9_ia64.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.9_hppa.deb stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.9_hppa.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-arm/libpng3_1.2.1-1.1.woody.9_arm.deb stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.9_arm.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.9_alpha.deb stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.9_alpha.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/source/libpng3_1.2.1-1.1.woody.9.diff.gz stable/main/source/libpng3_1.2.1-1.1.woody.9.dsc stable/main/binary-i386/libpng3_1.2.1-1.1.woody.9_i386.deb stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.9_i386.deb libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-sparc/libpng2_1.0.12-3.woody.9_sparc.deb stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.9_sparc.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.9_s390.deb stable/main/binary-s390/libpng2_1.0.12-3.woody.9_s390.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-powerpc/libpng2_1.0.12-3.woody.9_powerpc.deb stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.9_powerpc.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.9_mipsel.deb stable/main/binary-mipsel/libpng2_1.0.12-3.woody.9_mipsel.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.9_mips.deb stable/main/binary-mips/libpng2_1.0.12-3.woody.9_mips.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-m68k/libpng2_1.0.12-3.woody.9_m68k.deb stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.9_m68k.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.9_ia64.deb stable/main/binary-ia64/libpng2_1.0.12-3.woody.9_ia64.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.9_hppa.deb stable/main/binary-hppa/libpng2_1.0.12-3.woody.9_hppa.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.9_arm.deb stable/main/binary-arm/libpng2_1.0.12-3.woody.9_arm.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.9_alpha.deb stable/main/binary-alpha/libpng2_1.0.12-3.woody.9_alpha.deb libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.9_i386.deb stable/main/source/libpng_1.0.12-3.woody.9.diff.gz stable/main/binary-i386/libpng2_1.0.12-3.woody.9_i386.deb stable/main/source/libpng_1.0.12-3.woody.9.dsc libpng (1.0.12-3.woody.9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Reverted patch against pngrutil.c since it was only incomplete code reordering * The real patch was applied earlier already (CAN-2004-0597, DSA 536) stable/main/binary-sparc/libnids1_1.16-3woody1_sparc.deb stable/main/binary-sparc/libnids-dev_1.16-3woody1_sparc.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-s390/libnids1_1.16-3woody1_s390.deb stable/main/binary-s390/libnids-dev_1.16-3woody1_s390.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-powerpc/libnids1_1.16-3woody1_powerpc.deb stable/main/binary-powerpc/libnids-dev_1.16-3woody1_powerpc.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-mipsel/libnids1_1.16-3woody1_mipsel.deb stable/main/binary-mipsel/libnids-dev_1.16-3woody1_mipsel.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-mips/libnids1_1.16-3woody1_mips.deb stable/main/binary-mips/libnids-dev_1.16-3woody1_mips.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-m68k/libnids-dev_1.16-3woody1_m68k.deb stable/main/binary-m68k/libnids1_1.16-3woody1_m68k.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-ia64/libnids1_1.16-3woody1_ia64.deb stable/main/binary-ia64/libnids-dev_1.16-3woody1_ia64.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-hppa/libnids1_1.16-3woody1_hppa.deb stable/main/binary-hppa/libnids-dev_1.16-3woody1_hppa.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-arm/libnids-dev_1.16-3woody1_arm.deb stable/main/binary-arm/libnids1_1.16-3woody1_arm.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-alpha/libnids-dev_1.16-3woody1_alpha.deb stable/main/binary-alpha/libnids1_1.16-3woody1_alpha.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-i386/libnids-dev_1.16-3woody1_i386.deb stable/main/source/libnids_1.16-3woody1.diff.gz stable/main/source/libnids_1.16-3woody1.dsc stable/main/binary-i386/libnids1_1.16-3woody1_i386.deb libnids (1.16-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix overflow with large TCP datagrams (CAN-2003-0850) [src/tcp.c] stable/main/binary-sparc/libgtop-dev_1.0.13-3.1_sparc.deb stable/main/binary-sparc/libgtop1_1.0.13-3.1_sparc.deb stable/main/binary-sparc/libgtop-daemon_1.0.13-3.1_sparc.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-s390/libgtop-daemon_1.0.13-3.1_s390.deb stable/main/binary-s390/libgtop1_1.0.13-3.1_s390.deb stable/main/binary-s390/libgtop-dev_1.0.13-3.1_s390.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-powerpc/libgtop-dev_1.0.13-3.1_powerpc.deb stable/main/binary-powerpc/libgtop1_1.0.13-3.1_powerpc.deb stable/main/binary-powerpc/libgtop-daemon_1.0.13-3.1_powerpc.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-mipsel/libgtop-daemon_1.0.13-3.1_mipsel.deb stable/main/binary-mipsel/libgtop1_1.0.13-3.1_mipsel.deb stable/main/binary-mipsel/libgtop-dev_1.0.13-3.1_mipsel.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-mips/libgtop-daemon_1.0.13-3.1_mips.deb stable/main/binary-mips/libgtop1_1.0.13-3.1_mips.deb stable/main/binary-mips/libgtop-dev_1.0.13-3.1_mips.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-m68k/libgtop-daemon_1.0.13-3.1_m68k.deb stable/main/binary-m68k/libgtop-dev_1.0.13-3.1_m68k.deb stable/main/binary-m68k/libgtop1_1.0.13-3.1_m68k.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-ia64/libgtop-dev_1.0.13-3.1_ia64.deb stable/main/binary-ia64/libgtop-daemon_1.0.13-3.1_ia64.deb stable/main/binary-ia64/libgtop1_1.0.13-3.1_ia64.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-hppa/libgtop1_1.0.13-3.1_hppa.deb stable/main/binary-hppa/libgtop-daemon_1.0.13-3.1_hppa.deb stable/main/binary-hppa/libgtop-dev_1.0.13-3.1_hppa.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-arm/libgtop-daemon_1.0.13-3.1_arm.deb stable/main/binary-arm/libgtop1_1.0.13-3.1_arm.deb stable/main/binary-arm/libgtop-dev_1.0.13-3.1_arm.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-alpha/libgtop-daemon_1.0.13-3.1_alpha.deb stable/main/binary-alpha/libgtop1_1.0.13-3.1_alpha.deb stable/main/binary-alpha/libgtop-dev_1.0.13-3.1_alpha.deb libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-i386/libgtop-dev_1.0.13-3.1_i386.deb stable/main/binary-i386/libgtop1_1.0.13-3.1_i386.deb stable/main/binary-i386/libgtop-daemon_1.0.13-3.1_i386.deb stable/main/source/libgtop_1.0.13-3.1.dsc stable/main/source/libgtop_1.0.13-3.1.diff.gz libgtop (1.0.13-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in src/daemon/gnuserv.c (Closes: #182545) stable/main/binary-sparc/libapache-mod-python_2.7.8-0.0woody2_sparc.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-s390/libapache-mod-python_2.7.8-0.0woody2_s390.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-powerpc/libapache-mod-python_2.7.8-0.0woody2_powerpc.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-mipsel/libapache-mod-python_2.7.8-0.0woody2_mipsel.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-mips/libapache-mod-python_2.7.8-0.0woody2_mips.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-m68k/libapache-mod-python_2.7.8-0.0woody2_m68k.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-ia64/libapache-mod-python_2.7.8-0.0woody2_ia64.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-hppa/libapache-mod-python_2.7.8-0.0woody2_hppa.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-arm/libapache-mod-python_2.7.8-0.0woody2_arm.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-alpha/libapache-mod-python_2.7.8-0.0woody2_alpha.deb libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-i386/libapache-mod-python_2.7.8-0.0woody2_i386.deb stable/main/source/libapache-mod-python_2.7.8-0.0woody2.diff.gz stable/main/source/libapache-mod-python_2.7.8-0.0woody2.dsc libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high * Security update for woody. This release is the same as the previous release, with a fix backported from 3.0.4 to fix a denial of service bug. (CAN-2003-0973) (closes: #222828) stable/main/binary-sparc/libapache-mod-dav_1.0.3-3.1_sparc.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-s390/libapache-mod-dav_1.0.3-3.1_s390.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-powerpc/libapache-mod-dav_1.0.3-3.1_powerpc.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-mipsel/libapache-mod-dav_1.0.3-3.1_mipsel.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-mips/libapache-mod-dav_1.0.3-3.1_mips.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-m68k/libapache-mod-dav_1.0.3-3.1_m68k.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-ia64/libapache-mod-dav_1.0.3-3.1_ia64.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-hppa/libapache-mod-dav_1.0.3-3.1_hppa.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-arm/libapache-mod-dav_1.0.3-3.1_arm.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-alpha/libapache-mod-dav_1.0.3-3.1_alpha.deb libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/source/libapache-mod-dav_1.0.3-3.1.diff.gz stable/main/binary-i386/libapache-mod-dav_1.0.3-3.1_i386.deb stable/main/source/libapache-mod-dav_1.0.3-3.1.dsc libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream bug to fix a NULL pointer dereference (DoS) [dav_fs_lock.c, CAN-2004-0809] stable/main/binary-sparc/lftp_2.4.9-1woody2_sparc.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-s390/lftp_2.4.9-1woody2_s390.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-powerpc/lftp_2.4.9-1woody2_powerpc.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-mipsel/lftp_2.4.9-1woody2_mipsel.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-mips/lftp_2.4.9-1woody2_mips.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-m68k/lftp_2.4.9-1woody2_m68k.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-ia64/lftp_2.4.9-1woody2_ia64.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-hppa/lftp_2.4.9-1woody2_hppa.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-arm/lftp_2.4.9-1woody2_arm.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-alpha/lftp_2.4.9-1woody2_alpha.deb lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/source/lftp_2.4.9-1woody2.dsc stable/main/binary-i386/lftp_2.4.9-1woody2_i386.deb stable/main/source/lftp_2.4.9-1woody2.diff.gz lftp (2.4.9-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch config.guess to recognize mipsel stable/main/binary-sparc/lesstif1_0.93.18-5_sparc.deb stable/main/binary-sparc/lesstif-dev_0.93.18-5_sparc.deb stable/main/binary-sparc/lesstif-bin_0.93.18-5_sparc.deb stable/main/binary-sparc/lesstif-dbg_0.93.18-5_sparc.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-s390/lesstif-dev_0.93.18-5_s390.deb stable/main/binary-s390/lesstif-bin_0.93.18-5_s390.deb stable/main/binary-s390/lesstif1_0.93.18-5_s390.deb stable/main/binary-s390/lesstif-dbg_0.93.18-5_s390.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-powerpc/lesstif-bin_0.93.18-5_powerpc.deb stable/main/binary-powerpc/lesstif-dbg_0.93.18-5_powerpc.deb stable/main/binary-powerpc/lesstif1_0.93.18-5_powerpc.deb stable/main/binary-powerpc/lesstif-dev_0.93.18-5_powerpc.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-mipsel/lesstif-dev_0.93.18-5_mipsel.deb stable/main/binary-mipsel/lesstif1_0.93.18-5_mipsel.deb stable/main/binary-mipsel/lesstif-bin_0.93.18-5_mipsel.deb stable/main/binary-mipsel/lesstif-dbg_0.93.18-5_mipsel.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-mips/lesstif-bin_0.93.18-5_mips.deb stable/main/binary-mips/lesstif1_0.93.18-5_mips.deb stable/main/binary-mips/lesstif-dev_0.93.18-5_mips.deb stable/main/binary-mips/lesstif-dbg_0.93.18-5_mips.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-m68k/lesstif1_0.93.18-5_m68k.deb stable/main/binary-m68k/lesstif-bin_0.93.18-5_m68k.deb stable/main/binary-m68k/lesstif-dbg_0.93.18-5_m68k.deb stable/main/binary-m68k/lesstif-dev_0.93.18-5_m68k.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-ia64/lesstif1_0.93.18-5_ia64.deb stable/main/binary-ia64/lesstif-dbg_0.93.18-5_ia64.deb stable/main/binary-ia64/lesstif-bin_0.93.18-5_ia64.deb stable/main/binary-ia64/lesstif-dev_0.93.18-5_ia64.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-hppa/lesstif-dev_0.93.18-5_hppa.deb stable/main/binary-hppa/lesstif-bin_0.93.18-5_hppa.deb stable/main/binary-hppa/lesstif1_0.93.18-5_hppa.deb stable/main/binary-hppa/lesstif-dbg_0.93.18-5_hppa.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-arm/lesstif-dev_0.93.18-5_arm.deb stable/main/binary-arm/lesstif-dbg_0.93.18-5_arm.deb stable/main/binary-arm/lesstif1_0.93.18-5_arm.deb stable/main/binary-arm/lesstif-bin_0.93.18-5_arm.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-alpha/lesstif-dev_0.93.18-5_alpha.deb stable/main/binary-alpha/lesstif1_0.93.18-5_alpha.deb stable/main/binary-alpha/lesstif-bin_0.93.18-5_alpha.deb stable/main/binary-alpha/lesstif-dbg_0.93.18-5_alpha.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-all/lesstif-doc_0.93.18-5_all.deb stable/main/source/lesstif1-1_0.93.18-5.dsc stable/main/binary-i386/lesstif-dev_0.93.18-5_i386.deb stable/main/binary-i386/lesstif-bin_0.93.18-5_i386.deb stable/main/source/lesstif1-1_0.93.18-5.diff.gz stable/main/binary-i386/lesstif-dbg_0.93.18-5_i386.deb stable/main/binary-i386/lesstif1_0.93.18-5_i386.deb lesstif1-1 (1:0.93.18-5) stable-security; urgency=high * New maintainer release * Adjusted Maintainer field * Applied upstream security fix to fix recent XPM vulnerabilities + CAN-2004-0687: stack overflows in libXpm + CAN-2004-0688: integer overflows in libXpm Modified files: - lib/Xm/LTXpm.c - lib/Xm-2.0/Xpm.c - include/Motif-1.2/XmI/XmXpmI.h - include/Motif-2.0/XmI/XpmI.h - include/Motif-2.1/XmI/XmXpmI.h - include/Motif-2.1/XmI/XpmI.h stable/main/binary-sparc/lbreakout2_2.2.2-1woody1_sparc.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-s390/lbreakout2_2.2.2-1woody1_s390.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-powerpc/lbreakout2_2.2.2-1woody1_powerpc.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-mipsel/lbreakout2_2.2.2-1woody1_mipsel.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-mips/lbreakout2_2.2.2-1woody1_mips.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-m68k/lbreakout2_2.2.2-1woody1_m68k.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-ia64/lbreakout2_2.2.2-1woody1_ia64.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-hppa/lbreakout2_2.2.2-1woody1_hppa.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-arm/lbreakout2_2.2.2-1woody1_arm.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-alpha/lbreakout2_2.2.2-1woody1_alpha.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/source/lbreakout2_2.2.2-1woody1.dsc stable/main/source/lbreakout2_2.2.2-1woody1.diff.gz stable/main/binary-i386/lbreakout2_2.2.2-1woody1_i386.deb lbreakout2 (2.2.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix numerous buffer overflows due to improper use of environmental variables (CAN-2004-0158). stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody6_sparc.deb stable/main/binary-sparc/libkadm55_1.2.4-5woody6_sparc.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-s390/krb5-admin-server_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-kdc_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody6_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody6_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody6_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody6_s390.deb stable/main/binary-s390/libkrb5-dev_1.2.4-5woody6_s390.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-powerpc/libkrb53_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/libkadm55_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody6_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody6_powerpc.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/libkadm55_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/libkrb53_1.2.4-5woody6_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody6_mipsel.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-mips/libkadm55_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody6_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody6_mips.deb stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody6_mips.deb stable/main/binary-mips/libkrb53_1.2.4-5woody6_mips.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-user_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-kdc_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody6_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody6_m68k.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/libkadm55_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/libkrb53_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody6_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody6_ia64.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-i386/libkrb53_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-clients_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-ftpd_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody6_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody6_i386.deb stable/main/binary-i386/libkrb5-dev_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-telnetd_1.2.4-5woody6_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody6_i386.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-kdc_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/libkadm55_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody6_hppa.deb stable/main/binary-hppa/libkrb53_1.2.4-5woody6_hppa.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-arm/krb5-admin-server_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-telnetd_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-kdc_1.2.4-5woody6_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-user_1.2.4-5woody6_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody6_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody6_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody6_arm.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-all/krb5-doc_1.2.4-5woody6_all.deb stable/main/source/krb5_1.2.4-5woody6.diff.gz stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody6_alpha.deb stable/main/source/krb5_1.2.4-5woody6.dsc stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/krb5-user_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody6_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody6_alpha.deb krb5 (1.2.4-5woody6) stable-security; urgency=high * KDC and clients double-free on error conditions (CAN-2004-0642) * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643) * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and earlier allows unauthenticated remote attackers to induce infinite loop, causing denial of service, including in KDC code (CAN-2004-0644) * Update double free patch to include an additional rd_cred case stable/main/binary-all/kernel-doc-2.4.19_2.4.19-4.woody2_all.deb stable/main/source/kernel-source-2.4.19_2.4.19-4.woody2.diff.gz stable/main/binary-all/kernel-source-2.4.19_2.4.19-4.woody2_all.deb stable/main/source/kernel-source-2.4.19_2.4.19-4.woody2.dsc kernel-source-2.4.19 (2.4.19-4.woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied ptrace bugfix by Alan Cox to fix local root exploit [http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html, CAN-2003-0127] * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003, drivers/char/drm-4.0/r128_state.c] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-all/kernel-source-2.4.18_2.4.18-14.3_all.deb stable/main/binary-all/kernel-doc-2.4.18_2.4.18-14.3_all.deb stable/main/source/kernel-source-2.4.18_2.4.18-14.3.dsc stable/main/source/kernel-source-2.4.18_2.4.18-14.3.diff.gz kernel-source-2.4.18 (2.4.18-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003, drivers/char/drm-4.0/r128_state.c] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-sparc/mkcramfs_2.4.17-1woody3_sparc.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-s390/mkcramfs_2.4.17-1woody3_s390.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-powerpc/mkcramfs_2.4.17-1woody3_powerpc.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-mipsel/mkcramfs_2.4.17-1woody3_mipsel.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-mips/mkcramfs_2.4.17-1woody3_mips.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-m68k/mkcramfs_2.4.17-1woody3_m68k.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-ia64/mkcramfs_2.4.17-1woody3_ia64.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-hppa/mkcramfs_2.4.17-1woody3_hppa.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-arm/mkcramfs_2.4.17-1woody3_arm.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-alpha/mkcramfs_2.4.17-1woody3_alpha.deb kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody3_all.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody3.dsc stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody3_all.deb stable/main/binary-i386/mkcramfs_2.4.17-1woody3_i386.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody3.diff.gz kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/source/kernel-source-2.4.16_2.4.16-1woody2.diff.gz stable/main/binary-all/kernel-source-2.4.16_2.4.16-1woody2_all.deb stable/main/binary-all/kernel-doc-2.4.16_2.4.16-1woody2_all.deb stable/main/source/kernel-source-2.4.16_2.4.16-1woody2.dsc kernel-source-2.4.16 (2.4.16-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] * Applied additional patch by Ernie Petrides to fix another intance of the same * Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] * Applied patch extracted from Solar Designer's Owl patched kernel to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) * Applied patch by Andrea Arcangeli to fix local privilege escalation discovered by Paul Starzetz (CAN-2003-0985) * Added TASK_SIZE check to do_brk() [mm/mmap.c, CAN-2003-0961] * Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] * Applied ptrace bugfix by Alan Cox to fix local root exploit [http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html, CAN-2003-0127] * Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] * Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] * Removed mkcramfs binary package since it is superseded by 2.4.17 (built from kernel-source-2.4.17), because this would cause a katie reject otherwise. stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1woody1_all.deb stable/main/binary-all/kernel-source-2.2.22_2.2.22-1woody1_all.deb stable/main/source/kernel-source-2.2.22_2.2.22-1woody1.dsc stable/main/source/kernel-source-2.2.22_2.2.22-1woody1.diff.gz kernel-source-2.2.22 (2.2.22-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/binary-all/kernel-source-2.2.20_2.2.20-5woody3_all.deb stable/main/source/kernel-source-2.2.20_2.2.20-5woody3.dsc stable/main/source/kernel-source-2.2.20_2.2.20-5woody3.diff.gz stable/main/binary-all/kernel-doc-2.2.20_2.2.20-5woody3_all.deb kernel-source-2.2.20 (2.2.20-5woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-source-2.2.19_2.2.19.1-4woody1.diff.gz stable/main/source/kernel-source-2.2.19_2.2.19.1-4woody1.dsc stable/main/binary-all/kernel-doc-2.2.19_2.2.19.1-4woody1_all.deb stable/main/binary-all/kernel-source-2.2.19_2.2.19.1-4woody1_all.deb stable/main/source/kernel-source-2.2.19_2.2.19.1.orig.tar.gz kernel-source-2.2.19 (2.2.19.1-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) * Re-introduced into the Debian archive stable/main/binary-all/kernel-source-2.2.10_2.2.10-2_all.deb stable/main/source/kernel-source-2.2.10_2.2.10.orig.tar.gz stable/main/source/kernel-source-2.2.10_2.2.10-2.dsc stable/main/source/kernel-source-2.2.10_2.2.10-2.diff.gz stable/main/binary-all/kernel-doc-2.2.10_2.2.10-2_all.deb kernel-source-2.2.10 (2.2.10-2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Resurrected the source package from an old potato source CD *cough* * Removed kernel-image-2.2.10 and kernel-headers-2.2.10 * Imported debian/rules from 2.2.19 since the old version wasn't working (no makefile but called with make -f inside of the build target) * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz [mm/mremap.c, CAN-2004-0077] stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4.tar.gz stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody4_mips.deb stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody4_mips.deb stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody4_mips.deb stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody4_mips.deb stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4_all.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4.dsc kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody4) stable-security; urgency=low * Rebuild against kernel-source-2.4.19_2.4.19-4.woody2 to fix - a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - a local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - a local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] * Added versioned build-dependency on kernel-source >= 2.4.19-4.woody2 stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody6_mips.deb stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody6_mips.deb stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody6_mips.deb kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody6) stable-security; urgency=low * Rebuild against kernel-source-2.4.17_2.4.17-1woody3 to fix - a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - a local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - a local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] * Added versioned build-dependency on kernel-source >= 2.4.17-1woody3 stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6_all.deb stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody6_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody6_mipsel.deb stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody6_mipsel.deb stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6.dsc stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6.tar.gz stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody6_mipsel.deb kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody6) stable-security; urgency=low * Rebuild against kernel-source-2.4.17_2.4.17-1woody3 to fix - a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - a local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - a local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] * Added versioned build-dependency on kernel-source >= 2.4.17-1woody3 stable/main/source/kernel-patch-2.4.17-apus_2.4.17-5.dsc stable/main/binary-powerpc/kernel-headers-2.4.17-apus_2.4.17-5_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.17-apus_2.4.17-5_powerpc.deb stable/main/binary-powerpc/kernel-image-apus_2.4.17-5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.17-apus_2.4.17-5_powerpc.deb stable/main/source/kernel-patch-2.4.17-apus_2.4.17-5.tar.gz kernel-patch-2.4.17-apus (2.4.17-5) stable-security; urgency=low * Build-depens on kernel-source-2.4.17 2.4.17-1woody2, to pick up : - Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - Applied additional patch by Ernie Petrides to fix another intance of the same - Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/source/kernel-patch-2.4.16-arm_20040419.tar.gz stable/main/source/kernel-patch-2.4.16-arm_20040419.dsc stable/main/binary-all/kernel-patch-2.4.16-arm_20040419_all.deb kernel-patch-2.4.16-arm (20040419) stable-security; urgency=medium * Remove mmap/mremap security patches now included in main kernel-source package. * Add patch for mkdep over-long command lines. * Add fix for undefined "unlikely()" in mm/mremap.c stable/main/binary-powerpc/kernel-headers-2.2.20_2.2.20-3woody1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.2.20-pmac_2.2.20-3woody1_powerpc.deb stable/main/source/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.tar.gz stable/main/binary-powerpc/kernel-image-2.2.20-chrp_2.2.20-3woody1_powerpc.deb stable/main/binary-all/kernel-patch-2.2.20-powerpc_2.2.20-3woody1_all.deb stable/main/binary-powerpc/kernel-image-2.2.20-prep_2.2.20-3woody1_powerpc.deb stable/main/source/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.dsc kernel-patch-2.2.20-powerpc (2.2.20-3woody1) stable-security; urgency=high * Rebuild against kernel-source-2.2.20 2.2.20-5woody3 to pull in the patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/binary-all/kernel-patch-2.2.19-arm_20040303_all.deb stable/main/source/kernel-patch-2.2.19-arm_20040303.dsc stable/main/source/kernel-patch-2.2.19-arm_20040303.tar.gz kernel-patch-2.2.19-arm (20040303) stable-security; urgency=high * Resolve patch conflict with latest kernel-source-2.2.19. stable/main/binary-sparc/kernel-image-2.2.20-sun4dm-smp_9woody1_sparc.deb stable/main/binary-all/kernel-headers-2.2.20-sparc_9woody1_all.deb stable/main/source/kernel-image-sparc-2.2_9woody1.dsc stable/main/binary-sparc/kernel-image-2.2.20-sun4cdm_9woody1_sparc.deb stable/main/binary-sparc/kernel-image-2.2.20-sun4u-smp_9woody1_sparc.deb stable/main/source/kernel-image-sparc-2.2_9woody1.tar.gz stable/main/binary-sparc/kernel-image-2.2.20-sun4u_9woody1_sparc.deb kernel-image-sparc-2.2 (9woody1) stable-security; urgency=HIGH * NMU for security * Security update pulled in by adding versioned dependency on kernel-source-2.2.20 (2.2.20-5woody3): - CAN-2004-0077: Linux kernel do_mremap VMA limit local privilege escalation vulnerability (Closes: #238709) * Fix FTBFS: add debhelper and kernel-package to Build-Depends, and change tar Ixf usage to tar --bzip2 -xf * patches/all/sparc64-NEW_GAS-check: use ld -V, not ld --version, so as to work around incorrect use of sparc64-linux-ld stable/main/binary-hppa/kernel-image-2.4.18-32_62.3_hppa.deb stable/main/binary-hppa/kernel-image-2.4.18-64_62.3_hppa.deb stable/main/binary-hppa/kernel-headers-2.4.18-hppa_62.3_hppa.deb stable/main/source/kernel-image-2.4.18-hppa_62.3.dsc stable/main/binary-hppa/kernel-image-2.4.18-64-smp_62.3_hppa.deb stable/main/source/kernel-image-2.4.18-hppa_62.3.tar.gz stable/main/binary-all/kernel-source-2.4.18-hppa_62.3_all.deb stable/main/binary-hppa/kernel-image-2.4.18-32-smp_62.3_hppa.deb kernel-image-2.4.18-hppa (62.3) stable-security; urgency=high * Fixes for CAN-2004-0003, CAN-2004-0010, CAN-2004-0109, CAN-2004-0177, CAN-2004-0178. stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.4.dsc stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.4_s390.deb stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.4.tar.gz stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.4_s390.deb kernel-image-2.4.17-s390 (2.4.17-2.woody.4) stable-security; urgency=high * Rebuild against latest kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3, which includes the follwing additional security fixes: - Applied patch by Petr Vandrovec to fix a possible roothole in ncpfs discovered by Arjan van de Ven [fs/ncpfs/dir.c, CAN-2004-0010] - Applied patch by Sebastian Krahmer and Ernie Petrides to fix a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109] - Applied patch by Alan Cox and Thomas Biege to fix local root exploit in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003] - Applied additional patch by Ernie Petrides to fix another intance of the same - Applied patch by Theodore Ts'o to fix an information leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177] - Applied patch by Andreas Kies to fix local denial of service in the Sound Blaster driver [drivers/sound/sb_audio.c, CAN-2004-0178] stable/main/source/kernel-image-2.4.17-ia64_011226.17.dsc stable/main/binary-ia64/kernel-image-2.4.17-itanium_011226.17_ia64.deb stable/main/binary-ia64/kernel-image-2.4.17-mckinley-smp_011226.17_ia64.deb stable/main/binary-all/kernel-source-2.4.17-ia64_011226.17_all.deb stable/main/binary-ia64/kernel-headers-2.4.17-ia64_011226.17_ia64.deb stable/main/source/kernel-image-2.4.17-ia64_011226.17.tar.gz stable/main/binary-ia64/kernel-image-2.4.17-mckinley_011226.17_ia64.deb stable/main/binary-ia64/kernel-image-2.4.17-itanium-smp_011226.17_ia64.deb kernel-image-2.4.17-ia64 (011226.17) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch for CAN-2004-0003 (potential local root exploit in r128) * Apply patch for CAN-2004-0010 (potential local root exploit in ncpfs) * Apply patch for CAN-2004-0109 (potential local root exploit in isofs) * Apply patch for CAN-2004-0177 (information leak in ext3) * Apply patch for CAN-2004-0178 (DoS in sound) stable/main/source/kernel-image-2.4.17-hppa_32.4.dsc stable/main/source/kernel-image-2.4.17-hppa_32.4.tar.gz stable/main/binary-hppa/kernel-image-2.4.17-64_32.4_hppa.deb stable/main/binary-hppa/kernel-image-2.4.17-32-smp_32.4_hppa.deb stable/main/binary-hppa/kernel-headers-2.4.17-hppa_32.4_hppa.deb stable/main/binary-hppa/kernel-image-2.4.17-32_32.4_hppa.deb stable/main/binary-hppa/kernel-image-2.4.17-64-smp_32.4_hppa.deb stable/main/binary-all/kernel-source-2.4.17-hppa_32.4_all.deb kernel-image-2.4.17-hppa (32.4) stable-security; urgency=high * Fixes for CAN-2004-0003, CAN-2004-0010, CAN-2004-0109, CAN-2004-0177, CAN-2004-0178. stable/main/binary-arm/kernel-image-2.4.16-riscpc_20040419_arm.deb stable/main/source/kernel-image-2.4.16-riscpc_20040419.dsc stable/main/source/kernel-image-2.4.16-riscpc_20040419.tar.gz kernel-image-2.4.16-riscpc (20040419) stable-security; urgency=high * Rebuild with updated kernel-source-2.4.16 to incorporate fix for CAN-2004-0109. stable/main/binary-arm/kernel-image-2.4.16-netwinder_20040419_arm.deb stable/main/source/kernel-image-2.4.16-netwinder_20040419.tar.gz stable/main/binary-arm/kernel-headers-2.4.16_20040419_arm.deb stable/main/source/kernel-image-2.4.16-netwinder_20040419.dsc kernel-image-2.4.16-netwinder (20040419) stable-security; urgency=medium * Rebuild with updated kernel-source-2.4.16 to incorporate fix for CAN-2004-0109. stable/main/source/kernel-image-2.4.16-lart_20040419.dsc stable/main/binary-arm/kernel-image-2.4.16-lart_20040419_arm.deb stable/main/source/kernel-image-2.4.16-lart_20040419.tar.gz kernel-image-2.4.16-lart (20040419) stable-security; urgency=medium * Rebuild with updated kernel-source-2.4.16 to incorporate fix for CAN-2004-0109. stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-2_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-2_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-2.tar.gz stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-2_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-2_alpha.deb stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-2_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-2.dsc kernel-image-2.2.22-alpha (2.2.22-2) stable-security; urgency=high * Built against kernel-source 2.2.22-1woody1. stable/main/source/kernel-image-2.2.20-mvme16x_2.2.20-3.tar.gz stable/main/binary-m68k/kernel-image-2.2.20-mvme16x_2.2.20-3_m68k.deb stable/main/source/kernel-image-2.2.20-mvme16x_2.2.20-3.dsc kernel-image-2.2.20-mvme16x (2.2.20-3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.20-mvme147_2.2.20-3.dsc stable/main/source/kernel-image-2.2.20-mvme147_2.2.20-3.tar.gz stable/main/binary-m68k/kernel-image-2.2.20-mvme147_2.2.20-3_m68k.deb kernel-image-2.2.20-mvme147 (2.2.20-3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.20-mac_2.2.20-3.dsc stable/main/source/kernel-image-2.2.20-mac_2.2.20-3.tar.gz stable/main/binary-m68k/kernel-image-2.2.20-mac_2.2.20-3_m68k.deb kernel-image-2.2.20-mac (2.2.20-3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody5.tar.gz stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody5_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody5_i386.deb stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody5_i386.deb stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody5_i386.deb stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody5.dsc stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody5_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody5_i386.deb kernel-image-2.2.20-i386 (2.2.20-5woody5) stable-security; urgency=low * Non-maintainer upload by the Security Team * Built against kernel-source-2.2.20 2.2.20-5woody3 to include the patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) * Removed dependency and support for modules-scyld-source-0.1 since it doesn't build anymore anyway. * This effectively removes all *-scyld.o modules stable/main/binary-m68k/kernel-image-2.2.20-bvme6000_2.2.20-3_m68k.deb stable/main/source/kernel-image-2.2.20-bvme6000_2.2.20-3.dsc stable/main/source/kernel-image-2.2.20-bvme6000_2.2.20-3.tar.gz kernel-image-2.2.20-bvme6000 (2.2.20-3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.20-atari_2.2.20-3.tar.gz stable/main/source/kernel-image-2.2.20-atari_2.2.20-3.dsc stable/main/binary-m68k/kernel-image-2.2.20-atari_2.2.20-3_m68k.deb kernel-image-2.2.20-atari (2.2.20-3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.20-amiga_2.2.20-4.dsc stable/main/source/kernel-image-2.2.20-amiga_2.2.20-4.tar.gz stable/main/binary-m68k/kernel-image-2.2.20-amiga_2.2.20-4_m68k.deb kernel-image-2.2.20-amiga (2.2.20-4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 2.2.26 to fix local privilege escalation discovered by Paul Starzetz (CAN-2004-0077) stable/main/source/kernel-image-2.2.19-riscpc_20040303.dsc stable/main/binary-arm/kernel-image-2.2.19-riscpc_20040303_arm.deb stable/main/source/kernel-image-2.2.19-riscpc_20040303.tar.gz kernel-image-2.2.19-riscpc (20040303) stable-security; urgency=high * Recompile against kernel-source 2.2.19.1-4woody1 to incorporate patch for CAN-2004-0077. stable/main/source/kernel-image-2.2.19-netwinder_20040303.dsc stable/main/binary-arm/kernel-image-2.2.19-netwinder_20040303_arm.deb stable/main/source/kernel-image-2.2.19-netwinder_20040303.tar.gz stable/main/binary-arm/kernel-headers-2.2.19_20040303_arm.deb kernel-image-2.2.19-netwinder (20040303) stable-security; urgency=high * Recompile against kernel-source 2.2.19.1-4woody1 to incorporate patch for CAN-2004-0077. stable/main/binary-sparc/klprfax_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kpm_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kdf_2.2.2-9.2_sparc.deb stable/main/binary-sparc/klpq_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kfind_2.2.2-9.2_sparc.deb stable/main/binary-sparc/khexedit_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kcalc_2.2.2-9.2_sparc.deb stable/main/binary-sparc/knotes_2.2.2-9.2_sparc.deb stable/main/binary-sparc/karm_2.2.2-9.2_sparc.deb stable/main/binary-sparc/ktimer_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kab_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kfloppy_2.2.2-9.2_sparc.deb stable/main/binary-sparc/ark_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kljettool_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kjots_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kedit_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kdepasswd_2.2.2-9.2_sparc.deb stable/main/binary-sparc/kcharselect_2.2.2-9.2_sparc.deb stable/main/binary-sparc/klaptopdaemon_2.2.2-9.2_sparc.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/kcharselect_2.2.2-9.2_s390.deb stable/main/binary-s390/kcalc_2.2.2-9.2_s390.deb stable/main/binary-s390/kjots_2.2.2-9.2_s390.deb stable/main/binary-s390/kab_2.2.2-9.2_s390.deb stable/main/binary-s390/kfloppy_2.2.2-9.2_s390.deb stable/main/binary-s390/kljettool_2.2.2-9.2_s390.deb stable/main/binary-s390/ark_2.2.2-9.2_s390.deb stable/main/binary-s390/kpm_2.2.2-9.2_s390.deb stable/main/binary-s390/knotes_2.2.2-9.2_s390.deb stable/main/binary-s390/kfind_2.2.2-9.2_s390.deb stable/main/binary-s390/klaptopdaemon_2.2.2-9.2_s390.deb stable/main/binary-s390/kdepasswd_2.2.2-9.2_s390.deb stable/main/binary-s390/klpq_2.2.2-9.2_s390.deb stable/main/binary-s390/kdf_2.2.2-9.2_s390.deb stable/main/binary-s390/karm_2.2.2-9.2_s390.deb stable/main/binary-s390/khexedit_2.2.2-9.2_s390.deb stable/main/binary-s390/kedit_2.2.2-9.2_s390.deb stable/main/binary-s390/ktimer_2.2.2-9.2_s390.deb stable/main/binary-s390/klprfax_2.2.2-9.2_s390.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/kedit_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/ark_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kdf_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kjots_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/khexedit_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/ktimer_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/klpq_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kfloppy_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kpm_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kfind_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kdepasswd_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kljettool_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kcharselect_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/klaptopdaemon_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/knotes_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kab_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/kcalc_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/klprfax_2.2.2-9.2_powerpc.deb stable/main/binary-powerpc/karm_2.2.2-9.2_powerpc.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/kfloppy_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/klprfax_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kpm_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kab_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kdf_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kjots_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kcalc_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/khexedit_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kljettool_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/klaptopdaemon_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/karm_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/knotes_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kdepasswd_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/ktimer_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kfind_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/klpq_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kcharselect_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/kedit_2.2.2-9.2_mipsel.deb stable/main/binary-mipsel/ark_2.2.2-9.2_mipsel.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/kljettool_2.2.2-9.2_mips.deb stable/main/binary-mips/kcharselect_2.2.2-9.2_mips.deb stable/main/binary-mips/klaptopdaemon_2.2.2-9.2_mips.deb stable/main/binary-mips/klpq_2.2.2-9.2_mips.deb stable/main/binary-mips/kjots_2.2.2-9.2_mips.deb stable/main/binary-mips/khexedit_2.2.2-9.2_mips.deb stable/main/binary-mips/kcalc_2.2.2-9.2_mips.deb stable/main/binary-mips/kedit_2.2.2-9.2_mips.deb stable/main/binary-mips/kab_2.2.2-9.2_mips.deb stable/main/binary-mips/ark_2.2.2-9.2_mips.deb stable/main/binary-mips/kdepasswd_2.2.2-9.2_mips.deb stable/main/binary-mips/knotes_2.2.2-9.2_mips.deb stable/main/binary-mips/klprfax_2.2.2-9.2_mips.deb stable/main/binary-mips/kfloppy_2.2.2-9.2_mips.deb stable/main/binary-mips/kfind_2.2.2-9.2_mips.deb stable/main/binary-mips/ktimer_2.2.2-9.2_mips.deb stable/main/binary-mips/karm_2.2.2-9.2_mips.deb stable/main/binary-mips/kpm_2.2.2-9.2_mips.deb stable/main/binary-mips/kdf_2.2.2-9.2_mips.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/ark_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kjots_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kljettool_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kedit_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kpm_2.2.2-9.2_m68k.deb stable/main/binary-m68k/ktimer_2.2.2-9.2_m68k.deb stable/main/binary-m68k/khexedit_2.2.2-9.2_m68k.deb stable/main/binary-m68k/karm_2.2.2-9.2_m68k.deb stable/main/binary-m68k/klpq_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kdf_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kcalc_2.2.2-9.2_m68k.deb stable/main/binary-m68k/klprfax_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kfloppy_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kcharselect_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kab_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kfind_2.2.2-9.2_m68k.deb stable/main/binary-m68k/knotes_2.2.2-9.2_m68k.deb stable/main/binary-m68k/kdepasswd_2.2.2-9.2_m68k.deb stable/main/binary-m68k/klaptopdaemon_2.2.2-9.2_m68k.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/klprfax_2.2.2-9.2_i386.deb stable/main/binary-i386/klaptopdaemon_2.2.2-9.2_i386.deb stable/main/binary-i386/ark_2.2.2-9.2_i386.deb stable/main/binary-i386/kcharselect_2.2.2-9.2_i386.deb stable/main/binary-i386/khexedit_2.2.2-9.2_i386.deb stable/main/binary-i386/klpq_2.2.2-9.2_i386.deb stable/main/binary-i386/kdepasswd_2.2.2-9.2_i386.deb stable/main/binary-i386/kfloppy_2.2.2-9.2_i386.deb stable/main/binary-i386/ktimer_2.2.2-9.2_i386.deb stable/main/binary-i386/kfind_2.2.2-9.2_i386.deb stable/main/binary-i386/knotes_2.2.2-9.2_i386.deb stable/main/binary-i386/kdf_2.2.2-9.2_i386.deb stable/main/binary-i386/kab_2.2.2-9.2_i386.deb stable/main/binary-i386/kpm_2.2.2-9.2_i386.deb stable/main/binary-i386/kcalc_2.2.2-9.2_i386.deb stable/main/binary-i386/karm_2.2.2-9.2_i386.deb stable/main/binary-i386/kjots_2.2.2-9.2_i386.deb stable/main/binary-i386/kljettool_2.2.2-9.2_i386.deb stable/main/binary-i386/kedit_2.2.2-9.2_i386.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/kedit_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kab_2.2.2-9.2_hppa.deb stable/main/binary-hppa/klpq_2.2.2-9.2_hppa.deb stable/main/binary-hppa/karm_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kljettool_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kjots_2.2.2-9.2_hppa.deb stable/main/binary-hppa/ark_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kdf_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kdepasswd_2.2.2-9.2_hppa.deb stable/main/binary-hppa/ktimer_2.2.2-9.2_hppa.deb stable/main/binary-hppa/khexedit_2.2.2-9.2_hppa.deb stable/main/binary-hppa/klprfax_2.2.2-9.2_hppa.deb stable/main/binary-hppa/knotes_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kfind_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kfloppy_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kcalc_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kcharselect_2.2.2-9.2_hppa.deb stable/main/binary-hppa/klaptopdaemon_2.2.2-9.2_hppa.deb stable/main/binary-hppa/kpm_2.2.2-9.2_hppa.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kjots_2.2.2-9.2_arm.deb stable/main/binary-arm/kfloppy_2.2.2-9.2_arm.deb stable/main/binary-arm/khexedit_2.2.2-9.2_arm.deb stable/main/binary-arm/kfind_2.2.2-9.2_arm.deb stable/main/binary-arm/klpq_2.2.2-9.2_arm.deb stable/main/binary-arm/kpm_2.2.2-9.2_arm.deb stable/main/binary-arm/ktimer_2.2.2-9.2_arm.deb stable/main/binary-arm/kdepasswd_2.2.2-9.2_arm.deb stable/main/binary-arm/ark_2.2.2-9.2_arm.deb stable/main/binary-arm/kab_2.2.2-9.2_arm.deb stable/main/binary-arm/karm_2.2.2-9.2_arm.deb stable/main/binary-arm/kdf_2.2.2-9.2_arm.deb stable/main/binary-arm/knotes_2.2.2-9.2_arm.deb stable/main/binary-arm/kcharselect_2.2.2-9.2_arm.deb stable/main/binary-arm/klaptopdaemon_2.2.2-9.2_arm.deb stable/main/binary-arm/kljettool_2.2.2-9.2_arm.deb stable/main/binary-arm/klprfax_2.2.2-9.2_arm.deb stable/main/binary-arm/kcalc_2.2.2-9.2_arm.deb stable/main/binary-arm/kedit_2.2.2-9.2_arm.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/kcharselect_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kab_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kdf_2.2.2-9.2_alpha.deb stable/main/binary-alpha/klaptopdaemon_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kcalc_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kljettool_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kedit_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kfloppy_2.2.2-9.2_alpha.deb stable/main/binary-alpha/knotes_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kdepasswd_2.2.2-9.2_alpha.deb stable/main/binary-alpha/khexedit_2.2.2-9.2_alpha.deb stable/main/binary-alpha/karm_2.2.2-9.2_alpha.deb stable/main/binary-alpha/klpq_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kfind_2.2.2-9.2_alpha.deb stable/main/binary-alpha/ktimer_2.2.2-9.2_alpha.deb stable/main/binary-alpha/ark_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kjots_2.2.2-9.2_alpha.deb stable/main/binary-alpha/kpm_2.2.2-9.2_alpha.deb stable/main/binary-alpha/klprfax_2.2.2-9.2_alpha.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kdf_2.2.2-9.2_ia64.deb stable/main/binary-ia64/klaptopdaemon_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kjots_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kcalc_2.2.2-9.2_ia64.deb stable/main/source/kdeutils_2.2.2-9.2.diff.gz stable/main/binary-ia64/kedit_2.2.2-9.2_ia64.deb stable/main/binary-ia64/klpq_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kljettool_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kfloppy_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kab_2.2.2-9.2_ia64.deb stable/main/binary-ia64/karm_2.2.2-9.2_ia64.deb stable/main/binary-ia64/ktimer_2.2.2-9.2_ia64.deb stable/main/binary-ia64/klprfax_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kpm_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kcharselect_2.2.2-9.2_ia64.deb stable/main/binary-ia64/kdepasswd_2.2.2-9.2_ia64.deb stable/main/binary-ia64/khexedit_2.2.2-9.2_ia64.deb stable/main/binary-ia64/ark_2.2.2-9.2_ia64.deb stable/main/source/kdeutils_2.2.2-9.2.dsc stable/main/binary-ia64/kfind_2.2.2-9.2_ia64.deb stable/main/binary-ia64/knotes_2.2.2-9.2_ia64.deb kdeutils (4:2.2.2-9.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/kandy_2.2.2-5.2_s390.deb stable/main/binary-s390/korganizer_2.2.2-5.2_s390.deb stable/main/binary-s390/kdepim-libs_2.2.2-5.2_s390.deb stable/main/binary-s390/kpilot_2.2.2-5.2_s390.deb stable/main/binary-s390/kdepim-dev_2.2.2-5.2_s390.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/kandy_2.2.2-5.2_powerpc.deb stable/main/binary-powerpc/kdepim-dev_2.2.2-5.2_powerpc.deb stable/main/binary-powerpc/kpilot_2.2.2-5.2_powerpc.deb stable/main/binary-powerpc/korganizer_2.2.2-5.2_powerpc.deb stable/main/binary-powerpc/kdepim-libs_2.2.2-5.2_powerpc.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/kpilot_2.2.2-5.2_mipsel.deb stable/main/binary-mipsel/korganizer_2.2.2-5.2_mipsel.deb stable/main/binary-mipsel/kdepim-libs_2.2.2-5.2_mipsel.deb stable/main/binary-mipsel/kandy_2.2.2-5.2_mipsel.deb stable/main/binary-mipsel/kdepim-dev_2.2.2-5.2_mipsel.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/kandy_2.2.2-5.2_mips.deb stable/main/binary-mips/kdepim-dev_2.2.2-5.2_mips.deb stable/main/binary-mips/kpilot_2.2.2-5.2_mips.deb stable/main/binary-mips/korganizer_2.2.2-5.2_mips.deb stable/main/binary-mips/kdepim-libs_2.2.2-5.2_mips.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/kdepim-dev_2.2.2-5.2_m68k.deb stable/main/binary-m68k/kandy_2.2.2-5.2_m68k.deb stable/main/binary-m68k/korganizer_2.2.2-5.2_m68k.deb stable/main/binary-m68k/kpilot_2.2.2-5.2_m68k.deb stable/main/binary-m68k/kdepim-libs_2.2.2-5.2_m68k.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kpilot_2.2.2-5.2_ia64.deb stable/main/binary-ia64/kdepim-libs_2.2.2-5.2_ia64.deb stable/main/binary-ia64/kandy_2.2.2-5.2_ia64.deb stable/main/binary-ia64/kdepim-dev_2.2.2-5.2_ia64.deb stable/main/binary-ia64/korganizer_2.2.2-5.2_ia64.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/korganizer_2.2.2-5.2_i386.deb stable/main/binary-i386/kpilot_2.2.2-5.2_i386.deb stable/main/binary-i386/kdepim-dev_2.2.2-5.2_i386.deb stable/main/binary-i386/kdepim-libs_2.2.2-5.2_i386.deb stable/main/binary-i386/kandy_2.2.2-5.2_i386.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/korganizer_2.2.2-5.2_arm.deb stable/main/binary-arm/kdepim-libs_2.2.2-5.2_arm.deb stable/main/binary-arm/kdepim-dev_2.2.2-5.2_arm.deb stable/main/binary-arm/kpilot_2.2.2-5.2_arm.deb stable/main/binary-arm/kandy_2.2.2-5.2_arm.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/kdepim-dev_2.2.2-5.2_alpha.deb stable/main/binary-alpha/kandy_2.2.2-5.2_alpha.deb stable/main/binary-alpha/korganizer_2.2.2-5.2_alpha.deb stable/main/binary-alpha/kpilot_2.2.2-5.2_alpha.deb stable/main/binary-alpha/kdepim-libs_2.2.2-5.2_alpha.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/korganizer_2.2.2-5.2_sparc.deb stable/main/source/kdepim_2.2.2-5.2.dsc stable/main/binary-sparc/kandy_2.2.2-5.2_sparc.deb stable/main/source/kdepim_2.2.2-5.2.diff.gz stable/main/binary-sparc/kdepim-libs_2.2.2-5.2_sparc.deb stable/main/binary-sparc/kpilot_2.2.2-5.2_sparc.deb stable/main/binary-sparc/kdepim-dev_2.2.2-5.2_sparc.deb kdepim (4:2.2.2-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kdict_2.2.2-14.6_i386.deb stable/main/binary-i386/knewsticker_2.2.2-14.6_i386.deb stable/main/binary-i386/knode_2.2.2-14.6_i386.deb stable/main/binary-i386/kmail_2.2.2-14.6_i386.deb stable/main/binary-i386/ktalkd_2.2.2-14.6_i386.deb stable/main/binary-i386/klisa_2.2.2-14.6_i386.deb stable/main/binary-i386/libkdenetwork1_2.2.2-14.6_i386.deb stable/main/binary-i386/libmimelib-dev_2.2.2-14.6_i386.deb stable/main/binary-i386/libmimelib1_2.2.2-14.6_i386.deb stable/main/binary-i386/kppp_2.2.2-14.6_i386.deb stable/main/binary-i386/ksirc_2.2.2-14.6_i386.deb stable/main/binary-i386/kit_2.2.2-14.6_i386.deb stable/main/binary-i386/korn_2.2.2-14.6_i386.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-s390/kscd_2.2.2-8.2_s390.deb stable/main/binary-s390/libarts-mpeglib_2.2.2-8.2_s390.deb stable/main/binary-s390/noatun_2.2.2-8.2_s390.deb stable/main/binary-s390/artsbuilder_2.2.2-8.2_s390.deb stable/main/binary-s390/kmid_2.2.2-8.2_s390.deb stable/main/binary-s390/kmidi_2.2.2-8.2_s390.deb stable/main/binary-s390/mpeglib_2.2.2-8.2_s390.deb stable/main/binary-s390/kdemultimedia-dev_2.2.2-8.2_s390.deb stable/main/binary-s390/kmix_2.2.2-8.2_s390.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/mpeglib_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/kscd_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/noatun_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/artsbuilder_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/kmid_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/kmix_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/libarts-mpeglib_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/kmidi_2.2.2-8.2_powerpc.deb stable/main/binary-powerpc/kdemultimedia-dev_2.2.2-8.2_powerpc.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/noatun_2.2.2-8.2_m68k.deb stable/main/binary-m68k/artsbuilder_2.2.2-8.2_m68k.deb stable/main/binary-m68k/mpeglib_2.2.2-8.2_m68k.deb stable/main/binary-m68k/kmidi_2.2.2-8.2_m68k.deb stable/main/binary-m68k/kdemultimedia-dev_2.2.2-8.2_m68k.deb stable/main/binary-m68k/kscd_2.2.2-8.2_m68k.deb stable/main/binary-m68k/kmix_2.2.2-8.2_m68k.deb stable/main/binary-m68k/libarts-mpeglib_2.2.2-8.2_m68k.deb stable/main/binary-m68k/kmid_2.2.2-8.2_m68k.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/artsbuilder_2.2.2-8.2_ia64.deb stable/main/binary-ia64/noatun_2.2.2-8.2_ia64.deb stable/main/binary-ia64/kscd_2.2.2-8.2_ia64.deb stable/main/binary-ia64/libarts-mpeglib_2.2.2-8.2_ia64.deb stable/main/binary-ia64/kmix_2.2.2-8.2_ia64.deb stable/main/binary-ia64/mpeglib_2.2.2-8.2_ia64.deb stable/main/binary-ia64/kmidi_2.2.2-8.2_ia64.deb stable/main/binary-ia64/kdemultimedia-dev_2.2.2-8.2_ia64.deb stable/main/binary-ia64/kmid_2.2.2-8.2_ia64.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kdemultimedia-dev_2.2.2-8.2_i386.deb stable/main/binary-i386/kmid_2.2.2-8.2_i386.deb stable/main/binary-i386/kmix_2.2.2-8.2_i386.deb stable/main/binary-i386/kmidi_2.2.2-8.2_i386.deb stable/main/binary-i386/kscd_2.2.2-8.2_i386.deb stable/main/binary-i386/libarts-mpeglib_2.2.2-8.2_i386.deb stable/main/binary-i386/noatun_2.2.2-8.2_i386.deb stable/main/binary-i386/artsbuilder_2.2.2-8.2_i386.deb stable/main/binary-i386/mpeglib_2.2.2-8.2_i386.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/kmix_2.2.2-8.2_hppa.deb stable/main/binary-hppa/libarts-mpeglib_2.2.2-8.2_hppa.deb stable/main/binary-hppa/mpeglib_2.2.2-8.2_hppa.deb stable/main/binary-hppa/artsbuilder_2.2.2-8.2_hppa.deb stable/main/binary-hppa/kdemultimedia-dev_2.2.2-8.2_hppa.deb stable/main/binary-hppa/kmidi_2.2.2-8.2_hppa.deb stable/main/binary-hppa/kscd_2.2.2-8.2_hppa.deb stable/main/binary-hppa/kmid_2.2.2-8.2_hppa.deb stable/main/binary-hppa/noatun_2.2.2-8.2_hppa.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kmid_2.2.2-8.2_arm.deb stable/main/binary-arm/artsbuilder_2.2.2-8.2_arm.deb stable/main/binary-arm/kdemultimedia-dev_2.2.2-8.2_arm.deb stable/main/binary-arm/kscd_2.2.2-8.2_arm.deb stable/main/binary-arm/libarts-mpeglib_2.2.2-8.2_arm.deb stable/main/binary-arm/noatun_2.2.2-8.2_arm.deb stable/main/binary-arm/mpeglib_2.2.2-8.2_arm.deb stable/main/binary-arm/kmix_2.2.2-8.2_arm.deb stable/main/binary-arm/kmidi_2.2.2-8.2_arm.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/kmidi_2.2.2-8.2_alpha.deb stable/main/binary-alpha/kscd_2.2.2-8.2_alpha.deb stable/main/binary-alpha/kmix_2.2.2-8.2_alpha.deb stable/main/binary-alpha/noatun_2.2.2-8.2_alpha.deb stable/main/binary-alpha/libarts-mpeglib_2.2.2-8.2_alpha.deb stable/main/binary-alpha/kmid_2.2.2-8.2_alpha.deb stable/main/binary-alpha/kdemultimedia-dev_2.2.2-8.2_alpha.deb stable/main/binary-alpha/mpeglib_2.2.2-8.2_alpha.deb stable/main/binary-alpha/artsbuilder_2.2.2-8.2_alpha.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/kmix_2.2.2-8.2_sparc.deb stable/main/source/kdemultimedia_2.2.2-8.2.diff.gz stable/main/binary-sparc/kscd_2.2.2-8.2_sparc.deb stable/main/source/kdemultimedia_2.2.2-8.2.dsc stable/main/binary-sparc/libarts-mpeglib_2.2.2-8.2_sparc.deb stable/main/binary-sparc/kdemultimedia-dev_2.2.2-8.2_sparc.deb stable/main/binary-sparc/kmid_2.2.2-8.2_sparc.deb stable/main/binary-sparc/artsbuilder_2.2.2-8.2_sparc.deb stable/main/binary-sparc/noatun_2.2.2-8.2_sparc.deb stable/main/binary-sparc/kmidi_2.2.2-8.2_sparc.deb stable/main/binary-sparc/mpeglib_2.2.2-8.2_sparc.deb kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.12_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.12_sparc.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/libarts_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.12_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.12_s390.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.12_powerpc.deb stable/main/binary-powerpc/libkmid_2.2.2-13.woody.12_powerpc.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.12_mipsel.deb stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.12_mipsel.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.12_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.12_mips.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libkmid_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.12_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.12_m68k.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-ia64/libarts_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/libkmid_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.12_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.12_ia64.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/libarts_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/libkmid_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.12_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.12_i386.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.12_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.12_hppa.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-arm/libkmid_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/libarts_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.12_arm.deb stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.12_arm.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.12_alpha.deb stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.12_all.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.12_alpha.deb stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.12_alpha.deb stable/main/source/kdelibs_2.2.2-13.woody.12.dsc stable/main/source/kdelibs_2.2.2-13.woody.12.diff.gz stable/main/binary-alpha/libkmid_2.2.2-13.woody.12_alpha.deb kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch from Waldo Bastian to fix temporary filename vulnerabilities in the DCOP server [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689] * Bump the version number so the buildd will pick the package again since some refuse to upload. stable/main/binary-s390/ksmiletris_2.2.2-2.2_s390.deb stable/main/binary-s390/kjumpingcube_2.2.2-2.2_s390.deb stable/main/binary-s390/ktuberling_2.2.2-2.2_s390.deb stable/main/binary-s390/kreversi_2.2.2-2.2_s390.deb stable/main/binary-s390/kbattleship_2.2.2-2.2_s390.deb stable/main/binary-s390/ksokoban_2.2.2-2.2_s390.deb stable/main/binary-s390/kbackgammon_2.2.2-2.2_s390.deb stable/main/binary-s390/kmahjongg_2.2.2-2.2_s390.deb stable/main/binary-s390/kwin4_2.2.2-2.2_s390.deb stable/main/binary-s390/libkdegames_2.2.2-2.2_s390.deb stable/main/binary-s390/ksnake_2.2.2-2.2_s390.deb stable/main/binary-s390/kshisen_2.2.2-2.2_s390.deb stable/main/binary-s390/ksame_2.2.2-2.2_s390.deb stable/main/binary-s390/kmines_2.2.2-2.2_s390.deb stable/main/binary-s390/kasteroids_2.2.2-2.2_s390.deb stable/main/binary-s390/kabalone_2.2.2-2.2_s390.deb stable/main/binary-s390/ksirtet_2.2.2-2.2_s390.deb stable/main/binary-s390/katomic_2.2.2-2.2_s390.deb stable/main/binary-s390/ktron_2.2.2-2.2_s390.deb stable/main/binary-s390/kjezz_2.2.2-2.2_s390.deb stable/main/binary-s390/klines_2.2.2-2.2_s390.deb stable/main/binary-s390/lskat_2.2.2-2.2_s390.deb stable/main/binary-s390/kblackbox_2.2.2-2.2_s390.deb stable/main/binary-s390/konquest_2.2.2-2.2_s390.deb stable/main/binary-s390/kpat_2.2.2-2.2_s390.deb stable/main/binary-s390/kspaceduel_2.2.2-2.2_s390.deb stable/main/binary-s390/kpoker_2.2.2-2.2_s390.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/ksirtet_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/klines_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kpat_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kshisen_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kasteroids_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kmines_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kbackgammon_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/katomic_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ksnake_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ksame_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kblackbox_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kwin4_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ktron_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kjumpingcube_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ksmiletris_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kjezz_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kabalone_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/libkdegames_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kmahjongg_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ksokoban_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/lskat_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kspaceduel_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kbattleship_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kreversi_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/kpoker_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/ktuberling_2.2.2-2.2_powerpc.deb stable/main/binary-powerpc/konquest_2.2.2-2.2_powerpc.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/ksokoban_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kmahjongg_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kabalone_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ksnake_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kasteroids_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ksame_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ktuberling_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kbackgammon_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/lskat_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kblackbox_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kwin4_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kbattleship_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/katomic_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/libkdegames_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/klines_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kjumpingcube_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kmines_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ksmiletris_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kreversi_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kpat_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ksirtet_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/konquest_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/ktron_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kjezz_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kpoker_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kshisen_2.2.2-2.2_mipsel.deb stable/main/binary-mipsel/kspaceduel_2.2.2-2.2_mipsel.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/kmahjongg_2.2.2-2.2_mips.deb stable/main/binary-mips/ksokoban_2.2.2-2.2_mips.deb stable/main/binary-mips/kasteroids_2.2.2-2.2_mips.deb stable/main/binary-mips/kspaceduel_2.2.2-2.2_mips.deb stable/main/binary-mips/kwin4_2.2.2-2.2_mips.deb stable/main/binary-mips/kabalone_2.2.2-2.2_mips.deb stable/main/binary-mips/kjumpingcube_2.2.2-2.2_mips.deb stable/main/binary-mips/kblackbox_2.2.2-2.2_mips.deb stable/main/binary-mips/ktuberling_2.2.2-2.2_mips.deb stable/main/binary-mips/lskat_2.2.2-2.2_mips.deb stable/main/binary-mips/kmines_2.2.2-2.2_mips.deb stable/main/binary-mips/libkdegames_2.2.2-2.2_mips.deb stable/main/binary-mips/ksame_2.2.2-2.2_mips.deb stable/main/binary-mips/ktron_2.2.2-2.2_mips.deb stable/main/binary-mips/kbackgammon_2.2.2-2.2_mips.deb stable/main/binary-mips/kbattleship_2.2.2-2.2_mips.deb stable/main/binary-mips/ksmiletris_2.2.2-2.2_mips.deb stable/main/binary-mips/klines_2.2.2-2.2_mips.deb stable/main/binary-mips/kreversi_2.2.2-2.2_mips.deb stable/main/binary-mips/kpat_2.2.2-2.2_mips.deb stable/main/binary-mips/konquest_2.2.2-2.2_mips.deb stable/main/binary-mips/ksnake_2.2.2-2.2_mips.deb stable/main/binary-mips/kpoker_2.2.2-2.2_mips.deb stable/main/binary-mips/kjezz_2.2.2-2.2_mips.deb stable/main/binary-mips/katomic_2.2.2-2.2_mips.deb stable/main/binary-mips/ksirtet_2.2.2-2.2_mips.deb stable/main/binary-mips/kshisen_2.2.2-2.2_mips.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/kbackgammon_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kspaceduel_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kpoker_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kjumpingcube_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ktron_2.2.2-2.2_m68k.deb stable/main/binary-m68k/klines_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kbattleship_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kmahjongg_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ksame_2.2.2-2.2_m68k.deb stable/main/binary-m68k/katomic_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ksokoban_2.2.2-2.2_m68k.deb stable/main/binary-m68k/libkdegames_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kwin4_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ksmiletris_2.2.2-2.2_m68k.deb stable/main/binary-m68k/lskat_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kreversi_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ksirtet_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kabalone_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kmines_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kshisen_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kpat_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kjezz_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ktuberling_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kasteroids_2.2.2-2.2_m68k.deb stable/main/binary-m68k/konquest_2.2.2-2.2_m68k.deb stable/main/binary-m68k/ksnake_2.2.2-2.2_m68k.deb stable/main/binary-m68k/kblackbox_2.2.2-2.2_m68k.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kjumpingcube_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ksmiletris_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kreversi_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ksokoban_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kbackgammon_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kmahjongg_2.2.2-2.2_ia64.deb stable/main/binary-ia64/libkdegames_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kabalone_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kwin4_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kshisen_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kmines_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ksnake_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kasteroids_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kspaceduel_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kblackbox_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ksirtet_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kbattleship_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ktuberling_2.2.2-2.2_ia64.deb stable/main/binary-ia64/katomic_2.2.2-2.2_ia64.deb stable/main/binary-ia64/klines_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ktron_2.2.2-2.2_ia64.deb stable/main/binary-ia64/ksame_2.2.2-2.2_ia64.deb stable/main/binary-ia64/konquest_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kpoker_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kpat_2.2.2-2.2_ia64.deb stable/main/binary-ia64/kjezz_2.2.2-2.2_ia64.deb stable/main/binary-ia64/lskat_2.2.2-2.2_ia64.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kwin4_2.2.2-2.2_i386.deb stable/main/binary-i386/kjezz_2.2.2-2.2_i386.deb stable/main/binary-i386/kmahjongg_2.2.2-2.2_i386.deb stable/main/binary-i386/ksokoban_2.2.2-2.2_i386.deb stable/main/binary-i386/kspaceduel_2.2.2-2.2_i386.deb stable/main/binary-i386/ksnake_2.2.2-2.2_i386.deb stable/main/binary-i386/klines_2.2.2-2.2_i386.deb stable/main/binary-i386/kpoker_2.2.2-2.2_i386.deb stable/main/binary-i386/ktuberling_2.2.2-2.2_i386.deb stable/main/binary-i386/konquest_2.2.2-2.2_i386.deb stable/main/binary-i386/kbattleship_2.2.2-2.2_i386.deb stable/main/binary-i386/ksirtet_2.2.2-2.2_i386.deb stable/main/binary-i386/kmines_2.2.2-2.2_i386.deb stable/main/binary-i386/kshisen_2.2.2-2.2_i386.deb stable/main/binary-i386/katomic_2.2.2-2.2_i386.deb stable/main/binary-i386/kblackbox_2.2.2-2.2_i386.deb stable/main/binary-i386/libkdegames_2.2.2-2.2_i386.deb stable/main/binary-i386/kpat_2.2.2-2.2_i386.deb stable/main/binary-i386/lskat_2.2.2-2.2_i386.deb stable/main/binary-i386/kbackgammon_2.2.2-2.2_i386.deb stable/main/binary-i386/ktron_2.2.2-2.2_i386.deb stable/main/binary-i386/ksame_2.2.2-2.2_i386.deb stable/main/binary-i386/kreversi_2.2.2-2.2_i386.deb stable/main/binary-i386/kjumpingcube_2.2.2-2.2_i386.deb stable/main/binary-i386/kasteroids_2.2.2-2.2_i386.deb stable/main/binary-i386/kabalone_2.2.2-2.2_i386.deb stable/main/binary-i386/ksmiletris_2.2.2-2.2_i386.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/kblackbox_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ksirtet_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kbackgammon_2.2.2-2.2_hppa.deb stable/main/binary-hppa/konquest_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kpoker_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kpat_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kbattleship_2.2.2-2.2_hppa.deb stable/main/binary-hppa/katomic_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ksokoban_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kreversi_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ksmiletris_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kmahjongg_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kjumpingcube_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kwin4_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kspaceduel_2.2.2-2.2_hppa.deb stable/main/binary-hppa/klines_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kshisen_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ktron_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ksame_2.2.2-2.2_hppa.deb stable/main/binary-hppa/libkdegames_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kmines_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kabalone_2.2.2-2.2_hppa.deb stable/main/binary-hppa/lskat_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kjezz_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ksnake_2.2.2-2.2_hppa.deb stable/main/binary-hppa/ktuberling_2.2.2-2.2_hppa.deb stable/main/binary-hppa/kasteroids_2.2.2-2.2_hppa.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kshisen_2.2.2-2.2_arm.deb stable/main/binary-arm/kspaceduel_2.2.2-2.2_arm.deb stable/main/binary-arm/lskat_2.2.2-2.2_arm.deb stable/main/binary-arm/ktron_2.2.2-2.2_arm.deb stable/main/binary-arm/klines_2.2.2-2.2_arm.deb stable/main/binary-arm/kmines_2.2.2-2.2_arm.deb stable/main/binary-arm/konquest_2.2.2-2.2_arm.deb stable/main/binary-arm/kpoker_2.2.2-2.2_arm.deb stable/main/binary-arm/kpat_2.2.2-2.2_arm.deb stable/main/binary-arm/kasteroids_2.2.2-2.2_arm.deb stable/main/binary-arm/libkdegames_2.2.2-2.2_arm.deb stable/main/binary-arm/kabalone_2.2.2-2.2_arm.deb stable/main/binary-arm/kjezz_2.2.2-2.2_arm.deb stable/main/binary-arm/ksame_2.2.2-2.2_arm.deb stable/main/binary-arm/kmahjongg_2.2.2-2.2_arm.deb stable/main/binary-arm/ksokoban_2.2.2-2.2_arm.deb stable/main/binary-arm/kwin4_2.2.2-2.2_arm.deb stable/main/binary-arm/ksnake_2.2.2-2.2_arm.deb stable/main/binary-arm/kblackbox_2.2.2-2.2_arm.deb stable/main/binary-arm/ksirtet_2.2.2-2.2_arm.deb stable/main/binary-arm/kbackgammon_2.2.2-2.2_arm.deb stable/main/binary-arm/kreversi_2.2.2-2.2_arm.deb stable/main/binary-arm/katomic_2.2.2-2.2_arm.deb stable/main/binary-arm/ksmiletris_2.2.2-2.2_arm.deb stable/main/binary-arm/ktuberling_2.2.2-2.2_arm.deb stable/main/binary-arm/kjumpingcube_2.2.2-2.2_arm.deb stable/main/binary-arm/kbattleship_2.2.2-2.2_arm.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/kreversi_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ksmiletris_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kpoker_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kabalone_2.2.2-2.2_alpha.deb stable/main/binary-alpha/konquest_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kjezz_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kwin4_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ksame_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kmines_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kshisen_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kmahjongg_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ksokoban_2.2.2-2.2_alpha.deb stable/main/binary-alpha/lskat_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kpat_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ktuberling_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kasteroids_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ktron_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kjumpingcube_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kbattleship_2.2.2-2.2_alpha.deb stable/main/binary-alpha/libkdegames_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kbackgammon_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kblackbox_2.2.2-2.2_alpha.deb stable/main/binary-alpha/klines_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ksnake_2.2.2-2.2_alpha.deb stable/main/binary-alpha/kspaceduel_2.2.2-2.2_alpha.deb stable/main/binary-alpha/katomic_2.2.2-2.2_alpha.deb stable/main/binary-alpha/ksirtet_2.2.2-2.2_alpha.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/source/kdegames_2.2.2-2.2.dsc stable/main/binary-sparc/kpoker_2.2.2-2.2_sparc.deb stable/main/binary-sparc/konquest_2.2.2-2.2_sparc.deb stable/main/binary-sparc/lskat_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kabalone_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kasteroids_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kmines_2.2.2-2.2_sparc.deb stable/main/source/kdegames_2.2.2-2.2.diff.gz stable/main/binary-sparc/ksokoban_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kspaceduel_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kblackbox_2.2.2-2.2_sparc.deb stable/main/binary-all/kdecarddecks_2.2.2-2.2_all.deb stable/main/binary-sparc/ktron_2.2.2-2.2_sparc.deb stable/main/binary-sparc/ksame_2.2.2-2.2_sparc.deb stable/main/binary-sparc/libkdegames_2.2.2-2.2_sparc.deb stable/main/binary-sparc/klines_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kmahjongg_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kbattleship_2.2.2-2.2_sparc.deb stable/main/binary-sparc/ksnake_2.2.2-2.2_sparc.deb stable/main/binary-sparc/ksmiletris_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kjumpingcube_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kreversi_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kjezz_2.2.2-2.2_sparc.deb stable/main/binary-sparc/ktuberling_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kbackgammon_2.2.2-2.2_sparc.deb stable/main/binary-sparc/ksirtet_2.2.2-2.2_sparc.deb stable/main/binary-sparc/katomic_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kshisen_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kpat_2.2.2-2.2_sparc.deb stable/main/binary-sparc/kwin4_2.2.2-2.2_sparc.deb kdegames (4:2.2.2-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/libkonq-dev_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kdm_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kate_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kscreensaver_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kdebase_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kdebase-dev_2.2.2-14.8_sparc.deb stable/main/binary-sparc/libkonq3_2.2.2-14.8_sparc.deb stable/main/binary-sparc/konqueror_2.2.2-14.8_sparc.deb stable/main/binary-sparc/konsole_2.2.2-14.8_sparc.deb stable/main/binary-sparc/kdebase-libs_2.2.2-14.8_sparc.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-s390/kdebase_2.2.2-14.8_s390.deb stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.8_s390.deb stable/main/binary-s390/kate_2.2.2-14.8_s390.deb stable/main/binary-s390/libkonq-dev_2.2.2-14.8_s390.deb stable/main/binary-s390/konsole_2.2.2-14.8_s390.deb stable/main/binary-s390/libkonq3_2.2.2-14.8_s390.deb stable/main/binary-s390/kscreensaver_2.2.2-14.8_s390.deb stable/main/binary-s390/kdm_2.2.2-14.8_s390.deb stable/main/binary-s390/konqueror_2.2.2-14.8_s390.deb stable/main/binary-s390/kdebase-dev_2.2.2-14.8_s390.deb stable/main/binary-s390/kdebase-libs_2.2.2-14.8_s390.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-mipsel/libkonq3_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kdebase-libs_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kscreensaver_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/libkonq-dev_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kdebase_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/konsole_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/konqueror_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kdebase-dev_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kate_2.2.2-14.8_mipsel.deb stable/main/binary-mipsel/kdm_2.2.2-14.8_mipsel.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-mips/konsole_2.2.2-14.8_mips.deb stable/main/binary-mips/libkonq3_2.2.2-14.8_mips.deb stable/main/binary-mips/kdebase_2.2.2-14.8_mips.deb stable/main/binary-mips/kdm_2.2.2-14.8_mips.deb stable/main/binary-mips/kdebase-libs_2.2.2-14.8_mips.deb stable/main/binary-mips/konqueror_2.2.2-14.8_mips.deb stable/main/binary-mips/kate_2.2.2-14.8_mips.deb stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.8_mips.deb stable/main/binary-mips/kdebase-dev_2.2.2-14.8_mips.deb stable/main/binary-mips/libkonq-dev_2.2.2-14.8_mips.deb stable/main/binary-mips/kscreensaver_2.2.2-14.8_mips.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-m68k/kate_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kdebase_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kdm_2.2.2-14.8_m68k.deb stable/main/binary-m68k/konsole_2.2.2-14.8_m68k.deb stable/main/binary-m68k/konqueror_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kscreensaver_2.2.2-14.8_m68k.deb stable/main/binary-m68k/libkonq3_2.2.2-14.8_m68k.deb stable/main/binary-m68k/libkonq-dev_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kdebase-libs_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kdebase-dev_2.2.2-14.8_m68k.deb stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.8_m68k.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-ia64/kdm_2.2.2-14.8_ia64.deb stable/main/binary-ia64/konqueror_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kdebase-libs_2.2.2-14.8_ia64.deb stable/main/binary-ia64/konsole_2.2.2-14.8_ia64.deb stable/main/binary-ia64/libkonq3_2.2.2-14.8_ia64.deb stable/main/binary-ia64/libkonq-dev_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kdebase-dev_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kate_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kscreensaver_2.2.2-14.8_ia64.deb stable/main/binary-ia64/kdebase_2.2.2-14.8_ia64.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-i386/kdebase-dev_2.2.2-14.8_i386.deb stable/main/binary-i386/kdebase_2.2.2-14.8_i386.deb stable/main/binary-i386/kdebase-libs_2.2.2-14.8_i386.deb stable/main/binary-i386/kdm_2.2.2-14.8_i386.deb stable/main/binary-i386/libkonq3_2.2.2-14.8_i386.deb stable/main/binary-i386/konqueror_2.2.2-14.8_i386.deb stable/main/binary-i386/libkonq-dev_2.2.2-14.8_i386.deb stable/main/binary-i386/kscreensaver_2.2.2-14.8_i386.deb stable/main/binary-i386/konsole_2.2.2-14.8_i386.deb stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.8_i386.deb stable/main/binary-i386/kate_2.2.2-14.8_i386.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-hppa/konqueror_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kate_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kscreensaver_2.2.2-14.8_hppa.deb stable/main/binary-hppa/libkonq-dev_2.2.2-14.8_hppa.deb stable/main/binary-hppa/konsole_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kdebase-libs_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kdebase-dev_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kdebase_2.2.2-14.8_hppa.deb stable/main/binary-hppa/kdm_2.2.2-14.8_hppa.deb stable/main/binary-hppa/libkonq3_2.2.2-14.8_hppa.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-arm/libkonq3_2.2.2-14.8_arm.deb stable/main/binary-arm/konsole_2.2.2-14.8_arm.deb stable/main/binary-arm/konqueror_2.2.2-14.8_arm.deb stable/main/binary-arm/kdebase-libs_2.2.2-14.8_arm.deb stable/main/binary-arm/kdebase-dev_2.2.2-14.8_arm.deb stable/main/binary-arm/libkonq-dev_2.2.2-14.8_arm.deb stable/main/binary-arm/kdm_2.2.2-14.8_arm.deb stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.8_arm.deb stable/main/binary-arm/kdebase_2.2.2-14.8_arm.deb stable/main/binary-arm/kscreensaver_2.2.2-14.8_arm.deb stable/main/binary-arm/kate_2.2.2-14.8_arm.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-alpha/konsole_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kdebase_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kate_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kdebase-dev_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kdm_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kdebase-libs_2.2.2-14.8_alpha.deb stable/main/binary-alpha/libkonq3_2.2.2-14.8_alpha.deb stable/main/binary-alpha/libkonq-dev_2.2.2-14.8_alpha.deb stable/main/binary-alpha/kscreensaver_2.2.2-14.8_alpha.deb stable/main/binary-alpha/konqueror_2.2.2-14.8_alpha.deb kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-powerpc/libkonq-dev_2.2.2-14.8_powerpc.deb stable/main/source/kdebase_2.2.2-14.8.diff.gz stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kdebase-libs_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/konqueror_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kdm_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kdebase_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/libkonq3_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kdebase-dev_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kate_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/kscreensaver_2.2.2-14.8_powerpc.deb stable/main/binary-powerpc/konsole_2.2.2-14.8_powerpc.deb stable/main/binary-all/kdebase-doc_2.2.2-14.8_all.deb stable/main/binary-all/kdewallpapers_2.2.2-14.8_all.deb stable/main/source/kdebase_2.2.2-14.8.dsc kdebase (4:2.2.2-14.8) stable; urgency=medium * NMU to fix uninstallable konqueror security update packages on powerpc; urgency set accordingly. * Update debian/control to assert that konqueror replaces versions of kdebase-libs less than 4:2.2.2-14.2; the original woody version of konqueror for powerpc had a file, /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs for every other architecture, and in every subsequent security release. (Closes: #178507) stable/main/binary-s390/secpolicy_2.2.2-7.2_s390.deb stable/main/binary-s390/kwuftpd_2.2.2-7.2_s390.deb stable/main/binary-s390/kcmlinuz_2.2.2-7.2_s390.deb stable/main/binary-s390/kcron_2.2.2-7.2_s390.deb stable/main/binary-s390/kpackage_2.2.2-7.2_s390.deb stable/main/binary-s390/kuser_2.2.2-7.2_s390.deb stable/main/binary-s390/ksysv_2.2.2-7.2_s390.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/kpackage_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/kcron_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/kuser_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/secpolicy_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/ksysv_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/kcmlinuz_2.2.2-7.2_powerpc.deb stable/main/binary-powerpc/kwuftpd_2.2.2-7.2_powerpc.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/kcmlinuz_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/kwuftpd_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/secpolicy_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/kpackage_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/kuser_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/ksysv_2.2.2-7.2_mipsel.deb stable/main/binary-mipsel/kcron_2.2.2-7.2_mipsel.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/secpolicy_2.2.2-7.2_mips.deb stable/main/binary-mips/kwuftpd_2.2.2-7.2_mips.deb stable/main/binary-mips/kpackage_2.2.2-7.2_mips.deb stable/main/binary-mips/kuser_2.2.2-7.2_mips.deb stable/main/binary-mips/kcron_2.2.2-7.2_mips.deb stable/main/binary-mips/kcmlinuz_2.2.2-7.2_mips.deb stable/main/binary-mips/ksysv_2.2.2-7.2_mips.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/kcron_2.2.2-7.2_m68k.deb stable/main/binary-m68k/kuser_2.2.2-7.2_m68k.deb stable/main/binary-m68k/ksysv_2.2.2-7.2_m68k.deb stable/main/binary-m68k/kcmlinuz_2.2.2-7.2_m68k.deb stable/main/binary-m68k/kwuftpd_2.2.2-7.2_m68k.deb stable/main/binary-m68k/secpolicy_2.2.2-7.2_m68k.deb stable/main/binary-m68k/kpackage_2.2.2-7.2_m68k.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kpackage_2.2.2-7.2_ia64.deb stable/main/binary-ia64/secpolicy_2.2.2-7.2_ia64.deb stable/main/binary-ia64/ksysv_2.2.2-7.2_ia64.deb stable/main/binary-ia64/kcron_2.2.2-7.2_ia64.deb stable/main/binary-ia64/kuser_2.2.2-7.2_ia64.deb stable/main/binary-ia64/kcmlinuz_2.2.2-7.2_ia64.deb stable/main/binary-ia64/kwuftpd_2.2.2-7.2_ia64.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kpackage_2.2.2-7.2_i386.deb stable/main/binary-i386/kcmlinuz_2.2.2-7.2_i386.deb stable/main/binary-i386/kwuftpd_2.2.2-7.2_i386.deb stable/main/binary-i386/kuser_2.2.2-7.2_i386.deb stable/main/binary-i386/secpolicy_2.2.2-7.2_i386.deb stable/main/binary-i386/ksysv_2.2.2-7.2_i386.deb stable/main/binary-i386/lilo-config_2.2.2-7.2_i386.deb stable/main/binary-i386/kcron_2.2.2-7.2_i386.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/ksysv_2.2.2-7.2_hppa.deb stable/main/binary-hppa/kcron_2.2.2-7.2_hppa.deb stable/main/binary-hppa/secpolicy_2.2.2-7.2_hppa.deb stable/main/binary-hppa/kwuftpd_2.2.2-7.2_hppa.deb stable/main/binary-hppa/kcmlinuz_2.2.2-7.2_hppa.deb stable/main/binary-hppa/kuser_2.2.2-7.2_hppa.deb stable/main/binary-hppa/kpackage_2.2.2-7.2_hppa.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kcron_2.2.2-7.2_arm.deb stable/main/binary-arm/kwuftpd_2.2.2-7.2_arm.deb stable/main/binary-arm/kuser_2.2.2-7.2_arm.deb stable/main/binary-arm/kcmlinuz_2.2.2-7.2_arm.deb stable/main/binary-arm/ksysv_2.2.2-7.2_arm.deb stable/main/binary-arm/secpolicy_2.2.2-7.2_arm.deb stable/main/binary-arm/kpackage_2.2.2-7.2_arm.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/kwuftpd_2.2.2-7.2_alpha.deb stable/main/binary-alpha/secpolicy_2.2.2-7.2_alpha.deb stable/main/binary-alpha/kpackage_2.2.2-7.2_alpha.deb stable/main/binary-alpha/kcmlinuz_2.2.2-7.2_alpha.deb stable/main/binary-alpha/kuser_2.2.2-7.2_alpha.deb stable/main/binary-alpha/kcron_2.2.2-7.2_alpha.deb stable/main/binary-alpha/ksysv_2.2.2-7.2_alpha.deb kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/ksysv_2.2.2-7.2_sparc.deb stable/main/binary-sparc/kwuftpd_2.2.2-7.2_sparc.deb stable/main/binary-sparc/kcmlinuz_2.2.2-7.2_sparc.deb stable/main/source/kdeadmin_2.2.2-7.2.dsc stable/main/binary-sparc/kuser_2.2.2-7.2_sparc.deb stable/main/binary-sparc/kcron_2.2.2-7.2_sparc.deb stable/main/binary-sparc/kpackage_2.2.2-7.2_sparc.deb stable/main/binary-sparc/secpolicy_2.2.2-7.2_sparc.deb stable/main/source/kdeadmin_2.2.2-7.2.diff.gz kdeadmin (4:2.2.2-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-all/junior-puzzle_1.1woody1_all.deb stable/main/source/junior-puzzle_1.1woody1.dsc stable/main/source/junior-puzzle_1.1woody1.tar.gz junior-puzzle (1.1woody1) stable; urgency=medium * Removed rocks-n-diamonds, which has been removed from woody and has no suitable replacement. stable/main/binary-sparc/jitterbug_1.6.2-4.2woody2_sparc.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-s390/jitterbug_1.6.2-4.2woody2_s390.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-powerpc/jitterbug_1.6.2-4.2woody2_powerpc.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-mipsel/jitterbug_1.6.2-4.2woody2_mipsel.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-mips/jitterbug_1.6.2-4.2woody2_mips.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-m68k/jitterbug_1.6.2-4.2woody2_m68k.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-ia64/jitterbug_1.6.2-4.2woody2_ia64.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-hppa/jitterbug_1.6.2-4.2woody2_hppa.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-arm/jitterbug_1.6.2-4.2woody2_arm.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-alpha/jitterbug_1.6.2-4.2woody2_alpha.deb jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-i386/jitterbug_1.6.2-4.2woody2_i386.deb stable/main/source/jitterbug_1.6.2-4.2woody2.diff.gz stable/main/source/jitterbug_1.6.2-4.2woody2.dsc jitterbug (1.6.2-4.2woody2) stable-security; urgency=high * Non-maintainer upload by the security team. * Added build dependencies * Protection against insecure command execution. (CAN-2004-0028) stable/main/binary-sparc/jftpgw_0.13.1-1woody1_sparc.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-s390/jftpgw_0.13.1-1woody1_s390.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-powerpc/jftpgw_0.13.1-1woody1_powerpc.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-mipsel/jftpgw_0.13.1-1woody1_mipsel.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-mips/jftpgw_0.13.1-1woody1_mips.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-m68k/jftpgw_0.13.1-1woody1_m68k.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-ia64/jftpgw_0.13.1-1woody1_ia64.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-hppa/jftpgw_0.13.1-1woody1_hppa.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-arm/jftpgw_0.13.1-1woody1_arm.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-alpha/jftpgw_0.13.1-1woody1_alpha.deb jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/source/jftpgw_0.13.1-1woody1.diff.gz stable/main/binary-i386/jftpgw_0.13.1-1woody1_i386.deb stable/main/source/jftpgw_0.13.1-1woody1.dsc jftpgw (0.13.1-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix format string vulnerability in log() (CAN-2004-0448) stable/main/binary-sparc/iptables_1.2.6a-5.0woody1_sparc.deb stable/main/binary-sparc/iptables-dev_1.2.6a-5.0woody1_sparc.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-s390/iptables_1.2.6a-5.0woody1_s390.deb stable/main/binary-s390/iptables-dev_1.2.6a-5.0woody1_s390.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-powerpc/iptables_1.2.6a-5.0woody1_powerpc.deb stable/main/binary-powerpc/iptables-dev_1.2.6a-5.0woody1_powerpc.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-mipsel/iptables_1.2.6a-5.0woody1_mipsel.deb stable/main/binary-mipsel/iptables-dev_1.2.6a-5.0woody1_mipsel.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-mips/iptables_1.2.6a-5.0woody1_mips.deb stable/main/binary-mips/iptables-dev_1.2.6a-5.0woody1_mips.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-m68k/iptables-dev_1.2.6a-5.0woody1_m68k.deb stable/main/binary-m68k/iptables_1.2.6a-5.0woody1_m68k.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-ia64/iptables_1.2.6a-5.0woody1_ia64.deb stable/main/binary-ia64/iptables-dev_1.2.6a-5.0woody1_ia64.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-hppa/iptables_1.2.6a-5.0woody1_hppa.deb stable/main/binary-hppa/iptables-dev_1.2.6a-5.0woody1_hppa.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-arm/iptables-dev_1.2.6a-5.0woody1_arm.deb stable/main/binary-arm/iptables_1.2.6a-5.0woody1_arm.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-alpha/iptables-dev_1.2.6a-5.0woody1_alpha.deb stable/main/binary-alpha/iptables_1.2.6a-5.0woody1_alpha.deb iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-i386/iptables-dev_1.2.6a-5.0woody1_i386.deb stable/main/source/iptables_1.2.6a-5.0woody1.diff.gz stable/main/binary-i386/iptables_1.2.6a-5.0woody1_i386.deb stable/main/source/iptables_1.2.6a-5.0woody1.dsc iptables (1.2.6a-5.0woody1) stable; urgency=high * removed extra space character from the init script. The bug causes ruleset save failures and can silently truncate exisiting rulesets to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805) * removed an init script typo, s/Savinging/Saving/ stable/main/binary-sparc/iproute_20010824-8woody1_sparc.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-s390/iproute_20010824-8woody1_s390.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-powerpc/iproute_20010824-8woody1_powerpc.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-mipsel/iproute_20010824-8woody1_mipsel.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-mips/iproute_20010824-8woody1_mips.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-m68k/iproute_20010824-8woody1_m68k.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-ia64/iproute_20010824-8woody1_ia64.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-hppa/iproute_20010824-8woody1_hppa.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-arm/iproute_20010824-8woody1_arm.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/binary-alpha/iproute_20010824-8woody1_alpha.deb iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/source/iproute_20010824-8woody1.dsc stable/main/binary-i386/iproute_20010824-8woody1_i386.deb stable/main/source/iproute_20010824-8woody1.diff.gz iproute (20010824-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix DoS via spoofed netlink messages (CAN-2003-0856) stable/main/source/ipmasq_3.5.10d.dsc stable/main/binary-all/ipmasq_3.5.10d_all.deb stable/main/source/ipmasq_3.5.10d.tar.gz ipmasq (3.5.10d) stable; urgency=low * Fix wrong iptables path in rules-down/A02masqmethod.def to avoid gross functionality bug and unlikely security concerns after pulling down rule by the /etc/ipmasq/rules-down. (closes: #162647) stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.2_sparc.deb stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.2_sparc.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.2_s390.deb stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.2_s390.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.2_powerpc.deb stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.2_powerpc.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.2_mipsel.deb stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.2_mipsel.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.2_mips.deb stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.2_mips.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.2_m68k.deb stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.2_m68k.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.2_ia64.deb stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.2_ia64.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.2_hppa.deb stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.2_hppa.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.2_arm.deb stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.2_arm.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.2_alpha.deb stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.2_alpha.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.2_all.deb stable/main/source/interchange_4.8.3.20020306-1.woody.2.diff.gz stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.2_i386.deb stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.2_i386.deb stable/main/source/interchange_4.8.3.20020306-1.woody.2.dsc stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.2_all.deb interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high * fixed exposal of arbitrary variable contents by using an URL like http://shop.example.com/cgi-bin/store/__SQLUSER__ (Closes: #240800, CAN-2004-0374) stable/main/binary-sparc/libimlib2_1.0.5-2woody1_sparc.deb stable/main/binary-sparc/libimlib2-dev_1.0.5-2woody1_sparc.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-s390/libimlib2-dev_1.0.5-2woody1_s390.deb stable/main/binary-s390/libimlib2_1.0.5-2woody1_s390.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-powerpc/libimlib2_1.0.5-2woody1_powerpc.deb stable/main/binary-powerpc/libimlib2-dev_1.0.5-2woody1_powerpc.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-mipsel/libimlib2-dev_1.0.5-2woody1_mipsel.deb stable/main/binary-mipsel/libimlib2_1.0.5-2woody1_mipsel.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-mips/libimlib2-dev_1.0.5-2woody1_mips.deb stable/main/binary-mips/libimlib2_1.0.5-2woody1_mips.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-m68k/libimlib2_1.0.5-2woody1_m68k.deb stable/main/binary-m68k/libimlib2-dev_1.0.5-2woody1_m68k.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-ia64/libimlib2-dev_1.0.5-2woody1_ia64.deb stable/main/binary-ia64/libimlib2_1.0.5-2woody1_ia64.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-i386/libimlib2_1.0.5-2woody1_i386.deb stable/main/binary-i386/libimlib2-dev_1.0.5-2woody1_i386.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-arm/libimlib2-dev_1.0.5-2woody1_arm.deb stable/main/binary-arm/libimlib2_1.0.5-2woody1_arm.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-alpha/libimlib2-dev_1.0.5-2woody1_alpha.deb stable/main/binary-alpha/libimlib2_1.0.5-2woody1_alpha.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/source/imlib2_1.0.5-2woody1.diff.gz stable/main/binary-hppa/libimlib2-dev_1.0.5-2woody1_hppa.deb stable/main/source/imlib2_1.0.5-2woody1.dsc stable/main/binary-hppa/libimlib2_1.0.5-2woody1_hppa.deb imlib2 (1.0.5-2woody1) stable-security; urgency=high * Non-maintainer upload by the Securty Team * Applied patch by Marcus Meissner to fix heap overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802] stable/main/binary-sparc/imlib-dev_1.9.14-2wody1_sparc.deb stable/main/binary-sparc/gdk-imlib-dev_1.9.14-2wody1_sparc.deb stable/main/binary-sparc/imlib1_1.9.14-2wody1_sparc.deb stable/main/binary-sparc/imlib-progs_1.9.14-2wody1_sparc.deb stable/main/binary-sparc/gdk-imlib1_1.9.14-2wody1_sparc.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-s390/imlib-dev_1.9.14-2wody1_s390.deb stable/main/binary-s390/imlib1_1.9.14-2wody1_s390.deb stable/main/binary-s390/imlib-progs_1.9.14-2wody1_s390.deb stable/main/binary-s390/gdk-imlib1_1.9.14-2wody1_s390.deb stable/main/binary-s390/gdk-imlib-dev_1.9.14-2wody1_s390.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-powerpc/imlib-progs_1.9.14-2wody1_powerpc.deb stable/main/binary-powerpc/imlib-dev_1.9.14-2wody1_powerpc.deb stable/main/binary-powerpc/gdk-imlib1_1.9.14-2wody1_powerpc.deb stable/main/binary-powerpc/imlib1_1.9.14-2wody1_powerpc.deb stable/main/binary-powerpc/gdk-imlib-dev_1.9.14-2wody1_powerpc.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-mipsel/gdk-imlib1_1.9.14-2wody1_mipsel.deb stable/main/binary-mipsel/imlib-progs_1.9.14-2wody1_mipsel.deb stable/main/binary-mipsel/imlib1_1.9.14-2wody1_mipsel.deb stable/main/binary-mipsel/gdk-imlib-dev_1.9.14-2wody1_mipsel.deb stable/main/binary-mipsel/imlib-dev_1.9.14-2wody1_mipsel.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-mips/imlib-progs_1.9.14-2wody1_mips.deb stable/main/binary-mips/imlib-dev_1.9.14-2wody1_mips.deb stable/main/binary-mips/gdk-imlib1_1.9.14-2wody1_mips.deb stable/main/binary-mips/imlib1_1.9.14-2wody1_mips.deb stable/main/binary-mips/gdk-imlib-dev_1.9.14-2wody1_mips.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-m68k/imlib1_1.9.14-2wody1_m68k.deb stable/main/binary-m68k/imlib-progs_1.9.14-2wody1_m68k.deb stable/main/binary-m68k/imlib-dev_1.9.14-2wody1_m68k.deb stable/main/binary-m68k/gdk-imlib1_1.9.14-2wody1_m68k.deb stable/main/binary-m68k/gdk-imlib-dev_1.9.14-2wody1_m68k.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-ia64/gdk-imlib1_1.9.14-2wody1_ia64.deb stable/main/binary-ia64/imlib-progs_1.9.14-2wody1_ia64.deb stable/main/binary-ia64/gdk-imlib-dev_1.9.14-2wody1_ia64.deb stable/main/binary-ia64/imlib-dev_1.9.14-2wody1_ia64.deb stable/main/binary-ia64/imlib1_1.9.14-2wody1_ia64.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-i386/imlib1_1.9.14-2wody1_i386.deb stable/main/binary-i386/gdk-imlib1_1.9.14-2wody1_i386.deb stable/main/binary-i386/gdk-imlib-dev_1.9.14-2wody1_i386.deb stable/main/binary-i386/imlib-progs_1.9.14-2wody1_i386.deb stable/main/binary-i386/imlib-dev_1.9.14-2wody1_i386.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-arm/imlib1_1.9.14-2wody1_arm.deb stable/main/binary-arm/gdk-imlib-dev_1.9.14-2wody1_arm.deb stable/main/binary-arm/imlib-progs_1.9.14-2wody1_arm.deb stable/main/binary-arm/gdk-imlib1_1.9.14-2wody1_arm.deb stable/main/binary-arm/imlib-dev_1.9.14-2wody1_arm.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-alpha/gdk-imlib-dev_1.9.14-2wody1_alpha.deb stable/main/binary-alpha/imlib-dev_1.9.14-2wody1_alpha.deb stable/main/binary-alpha/imlib1_1.9.14-2wody1_alpha.deb stable/main/binary-alpha/gdk-imlib1_1.9.14-2wody1_alpha.deb stable/main/binary-alpha/imlib-progs_1.9.14-2wody1_alpha.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-hppa/gdk-imlib-dev_1.9.14-2wody1_hppa.deb stable/main/source/imlib_1.9.14-2wody1.diff.gz stable/main/binary-hppa/gdk-imlib1_1.9.14-2wody1_hppa.deb stable/main/binary-all/imlib-base_1.9.14-2wody1_all.deb stable/main/binary-hppa/imlib-dev_1.9.14-2wody1_hppa.deb stable/main/source/imlib_1.9.14-2wody1.dsc stable/main/binary-hppa/imlib1_1.9.14-2wody1_hppa.deb stable/main/binary-hppa/imlib-progs_1.9.14-2wody1_hppa.deb imlib (1.9.14-2wody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to fix arbitrary code execution through a heap overflow [gdk_imlib/io-bmp.c, CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034] stable/main/binary-sparc/ident2_1.03-3woody1_sparc.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-s390/ident2_1.03-3woody1_s390.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-powerpc/ident2_1.03-3woody1_powerpc.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-mipsel/ident2_1.03-3woody1_mipsel.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-mips/ident2_1.03-3woody1_mips.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-m68k/ident2_1.03-3woody1_m68k.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-ia64/ident2_1.03-3woody1_ia64.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-hppa/ident2_1.03-3woody1_hppa.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-arm/ident2_1.03-3woody1_arm.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-alpha/ident2_1.03-3woody1_alpha.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/source/ident2_1.03-3woody1.dsc stable/main/source/ident2_1.03-3woody1.diff.gz stable/main/binary-i386/ident2_1.03-3woody1_i386.deb ident2 (1.03-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Extend buffer in child_service by 2 bytes to prevent small overflow (CAN-2004-0408) stable/main/binary-sparc/icecast-server_1.3.11-4.2_sparc.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-s390/icecast-server_1.3.11-4.2_s390.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-powerpc/icecast-server_1.3.11-4.2_powerpc.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-mipsel/icecast-server_1.3.11-4.2_mipsel.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-mips/icecast-server_1.3.11-4.2_mips.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-m68k/icecast-server_1.3.11-4.2_m68k.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-ia64/icecast-server_1.3.11-4.2_ia64.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-i386/icecast-server_1.3.11-4.2_i386.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-hppa/icecast-server_1.3.11-4.2_hppa.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-arm/icecast-server_1.3.11-4.2_arm.deb icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-alpha/icecast-server_1.3.11-4.2_alpha.deb stable/main/source/icecast-server_1.3.11-4.2.tar.gz stable/main/source/icecast-server_1.3.11-4.2.dsc icecast-server (1:1.3.11-4.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Emmanuel le Chevoir to fix cross site scripting problem discovered by Markus Wörle [src/http.c, src/http.h, CAN-2004-0781] stable/main/binary-sparc/hztty_2.0-5.2woody1_sparc.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-s390/hztty_2.0-5.2woody1_s390.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-powerpc/hztty_2.0-5.2woody1_powerpc.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-mipsel/hztty_2.0-5.2woody1_mipsel.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-mips/hztty_2.0-5.2woody1_mips.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-m68k/hztty_2.0-5.2woody1_m68k.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-ia64/hztty_2.0-5.2woody1_ia64.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-hppa/hztty_2.0-5.2woody1_hppa.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-arm/hztty_2.0-5.2woody1_arm.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-alpha/hztty_2.0-5.2woody1_alpha.deb hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/source/hztty_2.0-5.2woody1.dsc stable/main/binary-i386/hztty_2.0-5.2woody1_i386.deb stable/main/source/hztty_2.0-5.2woody1.diff.gz hztty (2.0-5.2woody1) stable-security; urgency=low * Fix buffer overflows in io.c. Thanks to Jens Steube for the security analysis and fix. (CAN-2003-0783) * hztty should have been setgid utmp, not setuid root, ever since the release of Standards-Version: 3.0.0. My apologies for the oversight. stable/main/binary-sparc/gtksee_0.5.0-6_sparc.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-s390/gtksee_0.5.0-6_s390.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-powerpc/gtksee_0.5.0-6_powerpc.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-mipsel/gtksee_0.5.0-6_mipsel.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-mips/gtksee_0.5.0-6_mips.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-m68k/gtksee_0.5.0-6_m68k.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-ia64/gtksee_0.5.0-6_ia64.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-hppa/gtksee_0.5.0-6_hppa.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-arm/gtksee_0.5.0-6_arm.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-alpha/gtksee_0.5.0-6_alpha.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/source/gtksee_0.5.0-6.dsc stable/main/source/gtksee_0.5.0-6.diff.gz stable/main/binary-i386/gtksee_0.5.0-6_i386.deb gtksee (0.5.0-6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Viliam Holub to avoid a buffer overflow when <8-bit images are expanded (CAN-2003-0444) stable/main/binary-sparc/libgtk2.0-dbg_2.0.2-5woody2_sparc.deb stable/main/binary-sparc/libgtk2.0-0_2.0.2-5woody2_sparc.deb stable/main/binary-sparc/libgtk-common_2.0.2-5woody2_sparc.deb stable/main/binary-sparc/libgtk2.0-common_2.0.2-5woody2_sparc.deb stable/main/binary-sparc/gtk2.0-examples_2.0.2-5woody2_sparc.deb stable/main/binary-sparc/libgtk2.0-dev_2.0.2-5woody2_sparc.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-s390/libgtk-common_2.0.2-5woody2_s390.deb stable/main/binary-s390/libgtk2.0-0_2.0.2-5woody2_s390.deb stable/main/binary-s390/gtk2.0-examples_2.0.2-5woody2_s390.deb stable/main/binary-s390/libgtk2.0-dbg_2.0.2-5woody2_s390.deb stable/main/binary-s390/libgtk2.0-common_2.0.2-5woody2_s390.deb stable/main/binary-s390/libgtk2.0-dev_2.0.2-5woody2_s390.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-powerpc/libgtk2.0-dbg_2.0.2-5woody2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-0_2.0.2-5woody2_powerpc.deb stable/main/binary-powerpc/gtk2.0-examples_2.0.2-5woody2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-common_2.0.2-5woody2_powerpc.deb stable/main/binary-powerpc/libgtk-common_2.0.2-5woody2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-dev_2.0.2-5woody2_powerpc.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-mipsel/libgtk-common_2.0.2-5woody2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-0_2.0.2-5woody2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-common_2.0.2-5woody2_mipsel.deb stable/main/binary-mipsel/gtk2.0-examples_2.0.2-5woody2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-dbg_2.0.2-5woody2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-dev_2.0.2-5woody2_mipsel.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-mips/libgtk2.0-0_2.0.2-5woody2_mips.deb stable/main/binary-mips/libgtk2.0-common_2.0.2-5woody2_mips.deb stable/main/binary-mips/libgtk2.0-dev_2.0.2-5woody2_mips.deb stable/main/binary-mips/gtk2.0-examples_2.0.2-5woody2_mips.deb stable/main/binary-mips/libgtk2.0-dbg_2.0.2-5woody2_mips.deb stable/main/binary-mips/libgtk-common_2.0.2-5woody2_mips.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-m68k/libgtk2.0-0_2.0.2-5woody2_m68k.deb stable/main/binary-m68k/libgtk2.0-dbg_2.0.2-5woody2_m68k.deb stable/main/binary-m68k/libgtk-common_2.0.2-5woody2_m68k.deb stable/main/binary-m68k/gtk2.0-examples_2.0.2-5woody2_m68k.deb stable/main/binary-m68k/libgtk2.0-common_2.0.2-5woody2_m68k.deb stable/main/binary-m68k/libgtk2.0-dev_2.0.2-5woody2_m68k.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-ia64/libgtk2.0-0_2.0.2-5woody2_ia64.deb stable/main/binary-ia64/gtk2.0-examples_2.0.2-5woody2_ia64.deb stable/main/binary-ia64/libgtk2.0-common_2.0.2-5woody2_ia64.deb stable/main/binary-ia64/libgtk-common_2.0.2-5woody2_ia64.deb stable/main/binary-ia64/libgtk2.0-dev_2.0.2-5woody2_ia64.deb stable/main/binary-ia64/libgtk2.0-dbg_2.0.2-5woody2_ia64.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-hppa/libgtk2.0-dbg_2.0.2-5woody2_hppa.deb stable/main/binary-hppa/gtk2.0-examples_2.0.2-5woody2_hppa.deb stable/main/binary-hppa/libgtk2.0-common_2.0.2-5woody2_hppa.deb stable/main/binary-hppa/libgtk2.0-0_2.0.2-5woody2_hppa.deb stable/main/binary-hppa/libgtk2.0-dev_2.0.2-5woody2_hppa.deb stable/main/binary-hppa/libgtk-common_2.0.2-5woody2_hppa.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-arm/libgtk2.0-common_2.0.2-5woody2_arm.deb stable/main/binary-arm/libgtk2.0-dbg_2.0.2-5woody2_arm.deb stable/main/binary-arm/libgtk2.0-dev_2.0.2-5woody2_arm.deb stable/main/binary-arm/libgtk-common_2.0.2-5woody2_arm.deb stable/main/binary-arm/gtk2.0-examples_2.0.2-5woody2_arm.deb stable/main/binary-arm/libgtk2.0-0_2.0.2-5woody2_arm.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-alpha/libgtk2.0-dev_2.0.2-5woody2_alpha.deb stable/main/binary-alpha/gtk2.0-examples_2.0.2-5woody2_alpha.deb stable/main/binary-alpha/libgtk2.0-0_2.0.2-5woody2_alpha.deb stable/main/binary-alpha/libgtk2.0-dbg_2.0.2-5woody2_alpha.deb stable/main/binary-alpha/libgtk2.0-common_2.0.2-5woody2_alpha.deb stable/main/binary-alpha/libgtk-common_2.0.2-5woody2_alpha.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-i386/libgtk2.0-common_2.0.2-5woody2_i386.deb stable/main/binary-i386/libgtk2.0-dev_2.0.2-5woody2_i386.deb stable/main/source/gtk+2.0_2.0.2-5woody2.dsc stable/main/binary-all/libgtk2.0-doc_2.0.2-5woody2_all.deb stable/main/binary-i386/gtk2.0-examples_2.0.2-5woody2_i386.deb stable/main/binary-i386/libgtk2.0-0_2.0.2-5woody2_i386.deb stable/main/source/gtk+2.0_2.0.2-5woody2.diff.gz stable/main/binary-i386/libgtk-common_2.0.2-5woody2_i386.deb stable/main/binary-i386/libgtk2.0-dbg_2.0.2-5woody2_i386.deb gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788, debian/patches/010.CAN-2004-0788] * Applied patch by Matthias Clasen to fix stack-based overflow in xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783, debian/patches/010.CAN-2004-0783] * Applied patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782, debian/patches/010.CAN-2004-0782] stable/main/binary-sparc/gnupg_1.0.6-4woody3_sparc.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-s390/gnupg_1.0.6-4woody3_s390.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-powerpc/gnupg_1.0.6-4woody3_powerpc.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-mipsel/gnupg_1.0.6-4woody3_mipsel.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-mips/gnupg_1.0.6-4woody3_mips.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-m68k/gnupg_1.0.6-4woody3_m68k.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-ia64/gnupg_1.0.6-4woody3_ia64.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-hppa/gnupg_1.0.6-4woody3_hppa.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-arm/gnupg_1.0.6-4woody3_arm.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-alpha/gnupg_1.0.6-4woody3_alpha.deb gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-i386/gnupg_1.0.6-4woody3_i386.deb stable/main/source/gnupg_1.0.6-4woody3.diff.gz stable/main/source/gnupg_1.0.6-4woody3.dsc gnupg (1.0.6-4woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Recompile, no changes stable/main/binary-sparc/gkrellm-newsticker_0.3-3.1_sparc.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-s390/gkrellm-newsticker_0.3-3.1_s390.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-powerpc/gkrellm-newsticker_0.3-3.1_powerpc.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-mipsel/gkrellm-newsticker_0.3-3.1_mipsel.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-mips/gkrellm-newsticker_0.3-3.1_mips.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-m68k/gkrellm-newsticker_0.3-3.1_m68k.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-ia64/gkrellm-newsticker_0.3-3.1_ia64.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-i386/gkrellm-newsticker_0.3-3.1_i386.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-hppa/gkrellm-newsticker_0.3-3.1_hppa.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/binary-arm/gkrellm-newsticker_0.3-3.1_arm.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/source/gkrellm-newsticker_0.3-3.1.dsc stable/main/source/gkrellm-newsticker_0.3-3.1.diff.gz stable/main/binary-alpha/gkrellm-newsticker_0.3-3.1_alpha.deb gkrellm-newsticker (0.3-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Brian Campbell to fix DoS and arbitrary command execution. stable/main/source/getmail_2.3.7-2.dsc stable/main/binary-all/getmail_2.3.7-2_all.deb stable/main/source/getmail_2.3.7-2.diff.gz getmail (2.3.7-2) stable; urgency=high * Security fix for CAN-2004-0880, CAN-2004-0881 (bug:#264972) stable/main/binary-s390/geneweb_4.06-2_s390.deb stable/main/binary-s390/gwtp_4.06-2_s390.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-powerpc/geneweb_4.06-2_powerpc.deb stable/main/binary-powerpc/gwtp_4.06-2_powerpc.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-mipsel/geneweb_4.06-2_mipsel.deb stable/main/binary-mipsel/gwtp_4.06-2_mipsel.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-mips/geneweb_4.06-2_mips.deb stable/main/binary-mips/gwtp_4.06-2_mips.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-m68k/gwtp_4.06-2_m68k.deb stable/main/binary-m68k/geneweb_4.06-2_m68k.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-ia64/geneweb_4.06-2_ia64.deb stable/main/binary-ia64/gwtp_4.06-2_ia64.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-i386/gwtp_4.06-2_i386.deb stable/main/binary-i386/geneweb_4.06-2_i386.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-hppa/geneweb_4.06-2_hppa.deb stable/main/binary-hppa/gwtp_4.06-2_hppa.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-arm/gwtp_4.06-2_arm.deb stable/main/binary-arm/geneweb_4.06-2_arm.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-alpha/gwtp_4.06-2_alpha.deb stable/main/binary-alpha/geneweb_4.06-2_alpha.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/source/geneweb_4.06-2.diff.gz stable/main/binary-sparc/geneweb_4.06-2_sparc.deb stable/main/source/geneweb_4.06-2.dsc stable/main/binary-sparc/gwtp_4.06-2_sparc.deb geneweb (4.06-2) stable-security; urgency=high * Backported security fix from 4.09. Closes: 174779. * Corrected the stupid mistake in init script which made the log file be /var/log/.log. Closes: 169245 stable/main/binary-sparc/libgdk-pixbuf-dev_0.17.0-2woody2_sparc.deb stable/main/binary-sparc/libgdk-pixbuf2_0.17.0-2woody2_sparc.deb stable/main/binary-sparc/libgdk-pixbuf-gnome2_0.17.0-2woody2_sparc.deb stable/main/binary-sparc/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_sparc.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-s390/libgdk-pixbuf2_0.17.0-2woody2_s390.deb stable/main/binary-s390/libgdk-pixbuf-dev_0.17.0-2woody2_s390.deb stable/main/binary-s390/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_s390.deb stable/main/binary-s390/libgdk-pixbuf-gnome2_0.17.0-2woody2_s390.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-powerpc/libgdk-pixbuf-dev_0.17.0-2woody2_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf2_0.17.0-2woody2_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf-gnome2_0.17.0-2woody2_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_powerpc.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-mipsel/libgdk-pixbuf2_0.17.0-2woody2_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf-gnome2_0.17.0-2woody2_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf-dev_0.17.0-2woody2_mipsel.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-mips/libgdk-pixbuf-gnome2_0.17.0-2woody2_mips.deb stable/main/binary-mips/libgdk-pixbuf2_0.17.0-2woody2_mips.deb stable/main/binary-mips/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_mips.deb stable/main/binary-mips/libgdk-pixbuf-dev_0.17.0-2woody2_mips.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-m68k/libgdk-pixbuf-gnome2_0.17.0-2woody2_m68k.deb stable/main/binary-m68k/libgdk-pixbuf-dev_0.17.0-2woody2_m68k.deb stable/main/binary-m68k/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_m68k.deb stable/main/binary-m68k/libgdk-pixbuf2_0.17.0-2woody2_m68k.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-ia64/libgdk-pixbuf2_0.17.0-2woody2_ia64.deb stable/main/binary-ia64/libgdk-pixbuf-gnome2_0.17.0-2woody2_ia64.deb stable/main/binary-ia64/libgdk-pixbuf-dev_0.17.0-2woody2_ia64.deb stable/main/binary-ia64/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_ia64.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-hppa/libgdk-pixbuf2_0.17.0-2woody2_hppa.deb stable/main/binary-hppa/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_hppa.deb stable/main/binary-hppa/libgdk-pixbuf-dev_0.17.0-2woody2_hppa.deb stable/main/binary-hppa/libgdk-pixbuf-gnome2_0.17.0-2woody2_hppa.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-arm/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_arm.deb stable/main/binary-arm/libgdk-pixbuf2_0.17.0-2woody2_arm.deb stable/main/binary-arm/libgdk-pixbuf-dev_0.17.0-2woody2_arm.deb stable/main/binary-arm/libgdk-pixbuf-gnome2_0.17.0-2woody2_arm.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-alpha/libgdk-pixbuf-gnome2_0.17.0-2woody2_alpha.deb stable/main/binary-alpha/libgdk-pixbuf2_0.17.0-2woody2_alpha.deb stable/main/binary-alpha/libgdk-pixbuf-dev_0.17.0-2woody2_alpha.deb stable/main/binary-alpha/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_alpha.deb gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/binary-i386/libgdk-pixbuf2_0.17.0-2woody2_i386.deb stable/main/binary-i386/libgdk-pixbuf-gnome2_0.17.0-2woody2_i386.deb stable/main/source/gdk-pixbuf_0.17.0-2woody2.dsc stable/main/binary-i386/libgdk-pixbuf-dev_0.17.0-2woody2_i386.deb stable/main/binary-i386/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_i386.deb stable/main/source/gdk-pixbuf_0.17.0-2woody2.diff.gz gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Matthias Clasen to fix integer overflow in the ico loader [gdk-pixbuf/io-ico.c, CAN-2004-0788] * Backported patch by Matthias Clasen to fix heap-based overflow in pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782] * Applied patch by Manish Singh to fix denial of service in the bmp loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753, http://bugzilla.gnome.org/show_bug.cgi?id=150601] stable/main/source/gatos_0.0.5-6woody1.diff.gz stable/main/binary-i386/gatos_0.0.5-6woody1_i386.deb stable/main/binary-i386/libgatos0_0.0.5-6woody1_i386.deb stable/main/source/gatos_0.0.5-6woody1.dsc stable/main/binary-i386/libgatos-dev_0.0.5-6woody1_i386.deb gatos (0.0.5-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Don't attempt to use system() to run the configuration program; just print a message instead. This eliminates a vulnerability where system() trusts the PATH environment variable (CAN-2004-0395) stable/main/source/gallery_1.2.5-8woody2.dsc stable/main/binary-all/gallery_1.2.5-8woody2_all.deb stable/main/source/gallery_1.2.5-8woody2.diff.gz gallery (1.2.5-8woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add GALLERY_EMBEDDED_INSIDE{,_TYPE} to $sensitiveList in init.php, to prevent a vulnerability allowing access to the gallery admin user without proper authentication (no CVE candidate available at time of release) stable/main/binary-s390/gaim-gnome_0.58-2.4_s390.deb stable/main/binary-s390/gaim-common_0.58-2.4_s390.deb stable/main/binary-s390/gaim_0.58-2.4_s390.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-powerpc/gaim-gnome_0.58-2.4_powerpc.deb stable/main/binary-powerpc/gaim_0.58-2.4_powerpc.deb stable/main/binary-powerpc/gaim-common_0.58-2.4_powerpc.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-mipsel/gaim_0.58-2.4_mipsel.deb stable/main/binary-mipsel/gaim-gnome_0.58-2.4_mipsel.deb stable/main/binary-mipsel/gaim-common_0.58-2.4_mipsel.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-mips/gaim-gnome_0.58-2.4_mips.deb stable/main/binary-mips/gaim_0.58-2.4_mips.deb stable/main/binary-mips/gaim-common_0.58-2.4_mips.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-m68k/gaim_0.58-2.4_m68k.deb stable/main/binary-m68k/gaim-gnome_0.58-2.4_m68k.deb stable/main/binary-m68k/gaim-common_0.58-2.4_m68k.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-ia64/gaim_0.58-2.4_ia64.deb stable/main/binary-ia64/gaim-gnome_0.58-2.4_ia64.deb stable/main/binary-ia64/gaim-common_0.58-2.4_ia64.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-i386/gaim-common_0.58-2.4_i386.deb stable/main/binary-i386/gaim_0.58-2.4_i386.deb stable/main/binary-i386/gaim-gnome_0.58-2.4_i386.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-hppa/gaim-gnome_0.58-2.4_hppa.deb stable/main/binary-hppa/gaim_0.58-2.4_hppa.deb stable/main/binary-hppa/gaim-common_0.58-2.4_hppa.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-arm/gaim-common_0.58-2.4_arm.deb stable/main/binary-arm/gaim_0.58-2.4_arm.deb stable/main/binary-arm/gaim-gnome_0.58-2.4_arm.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-alpha/gaim_0.58-2.4_alpha.deb stable/main/binary-alpha/gaim-gnome_0.58-2.4_alpha.deb stable/main/binary-alpha/gaim-common_0.58-2.4_alpha.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-sparc/gaim-common_0.58-2.4_sparc.deb stable/main/source/gaim_0.58-2.4.dsc stable/main/source/gaim_0.58-2.4.diff.gz stable/main/binary-sparc/gaim_0.58-2.4_sparc.deb stable/main/binary-sparc/gaim-gnome_0.58-2.4_sparc.deb gaim (1:0.58-2.4) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect overflow [src/proxy.c], CAN-2004-0006 * Applied a patch to fix an AIM/Oscar DirectIM integer overflow [src/protocols/oscar/ft.c], CAN-2004-0008 stable/main/binary-sparc/fspd_2.81.b3-3.1woody1_sparc.deb stable/main/binary-sparc/fsp_2.81.b3-3.1woody1_sparc.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-s390/fsp_2.81.b3-3.1woody1_s390.deb stable/main/binary-s390/fspd_2.81.b3-3.1woody1_s390.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-powerpc/fsp_2.81.b3-3.1woody1_powerpc.deb stable/main/binary-powerpc/fspd_2.81.b3-3.1woody1_powerpc.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-mipsel/fsp_2.81.b3-3.1woody1_mipsel.deb stable/main/binary-mipsel/fspd_2.81.b3-3.1woody1_mipsel.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-mips/fsp_2.81.b3-3.1woody1_mips.deb stable/main/binary-mips/fspd_2.81.b3-3.1woody1_mips.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-m68k/fspd_2.81.b3-3.1woody1_m68k.deb stable/main/binary-m68k/fsp_2.81.b3-3.1woody1_m68k.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-ia64/fsp_2.81.b3-3.1woody1_ia64.deb stable/main/binary-ia64/fspd_2.81.b3-3.1woody1_ia64.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-hppa/fsp_2.81.b3-3.1woody1_hppa.deb stable/main/binary-hppa/fspd_2.81.b3-3.1woody1_hppa.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-arm/fsp_2.81.b3-3.1woody1_arm.deb stable/main/binary-arm/fspd_2.81.b3-3.1woody1_arm.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-alpha/fsp_2.81.b3-3.1woody1_alpha.deb stable/main/binary-alpha/fspd_2.81.b3-3.1woody1_alpha.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/source/fsp_2.81.b3-3.1woody1.diff.gz stable/main/binary-i386/fspd_2.81.b3-3.1woody1_i386.deb stable/main/source/fsp_2.81.b3-3.1woody1.dsc stable/main/binary-i386/fsp_2.81.b3-3.1woody1_i386.deb fsp (2.81.b3-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix directory traversal bug in validate_path() (CAN-2003-1022) [server/file.c] stable/main/binary-sparc/freenet6_0.9.6-1woody3_sparc.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-s390/freenet6_0.9.6-1woody3_s390.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-powerpc/freenet6_0.9.6-1woody3_powerpc.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-mipsel/freenet6_0.9.6-1woody3_mipsel.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-mips/freenet6_0.9.6-1woody3_mips.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-m68k/freenet6_0.9.6-1woody3_m68k.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-ia64/freenet6_0.9.6-1woody3_ia64.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-hppa/freenet6_0.9.6-1woody3_hppa.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-arm/freenet6_0.9.6-1woody3_arm.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-alpha/freenet6_0.9.6-1woody3_alpha.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/source/freenet6_0.9.6-1woody3.dsc stable/main/source/freenet6_0.9.6-1woody3.diff.gz stable/main/binary-i386/freenet6_0.9.6-1woody3_i386.deb freenet6 (0.9.6-1woody3) stable-security; urgency=medium * Non-mainatiner upload by the Security Team * Added a dependency to stat which is not yet an essential package (as in sid). stable/main/binary-all/flim_1.14.3-9woody1_all.deb stable/main/source/flim_1.14.3-9woody1.diff.gz stable/main/source/flim_1.14.3-9woody1.dsc flim (1:1.14.3-9woody1) stable-security; urgency=high * mel-u.el (mime-write-decoded-region): Use mel-u-make-temp-file. (uuencode-external-decode-region): Ditto. (backport from upstream CVS version on 2004-04-15) * Fixes insecure temporary file vulnerabilities (CAN-2004-0422) stable/main/binary-sparc/eximon_3.35-1woody3_sparc.deb stable/main/binary-sparc/exim_3.35-1woody3_sparc.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-s390/exim_3.35-1woody3_s390.deb stable/main/binary-s390/eximon_3.35-1woody3_s390.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-powerpc/eximon_3.35-1woody3_powerpc.deb stable/main/binary-powerpc/exim_3.35-1woody3_powerpc.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-mipsel/eximon_3.35-1woody3_mipsel.deb stable/main/binary-mipsel/exim_3.35-1woody3_mipsel.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-mips/exim_3.35-1woody3_mips.deb stable/main/binary-mips/eximon_3.35-1woody3_mips.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-m68k/eximon_3.35-1woody3_m68k.deb stable/main/binary-m68k/exim_3.35-1woody3_m68k.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-ia64/eximon_3.35-1woody3_ia64.deb stable/main/binary-ia64/exim_3.35-1woody3_ia64.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-hppa/exim_3.35-1woody3_hppa.deb stable/main/binary-hppa/eximon_3.35-1woody3_hppa.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-arm/exim_3.35-1woody3_arm.deb stable/main/binary-arm/eximon_3.35-1woody3_arm.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-alpha/exim_3.35-1woody3_alpha.deb stable/main/binary-alpha/eximon_3.35-1woody3_alpha.deb exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/source/exim_3.35-1woody3.dsc stable/main/binary-i386/exim_3.35-1woody3_i386.deb stable/main/binary-i386/eximon_3.35-1woody3_i386.deb stable/main/source/exim_3.35-1woody3.diff.gz exim (3.35-1woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Georgi Guninski to fix a stack-based buffer overflow when "sender_verify = true" [src/verify.c, CAN-2004-0399] * Added bounds checking when copying header content to fix a buffer overflow when headers_check_syntax is enabled, discovered by Georgi Guninski [src/accept.c, CAN-2004-0400] stable/main/binary-sparc/ethereal-dev_0.9.4-1woody8_sparc.deb stable/main/binary-sparc/ethereal_0.9.4-1woody8_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody8_sparc.deb stable/main/binary-sparc/tethereal_0.9.4-1woody8_sparc.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-s390/ethereal-common_0.9.4-1woody8_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody8_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody8_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody8_s390.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody8_powerpc.deb stable/main/binary-powerpc/ethereal_0.9.4-1woody8_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody8_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody8_powerpc.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-mipsel/ethereal-common_0.9.4-1woody8_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody8_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody8_mipsel.deb stable/main/binary-mipsel/tethereal_0.9.4-1woody8_mipsel.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-mips/ethereal_0.9.4-1woody8_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody8_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody8_mips.deb stable/main/binary-mips/ethereal-dev_0.9.4-1woody8_mips.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-m68k/ethereal-common_0.9.4-1woody8_m68k.deb stable/main/binary-m68k/ethereal_0.9.4-1woody8_m68k.deb stable/main/binary-m68k/ethereal-dev_0.9.4-1woody8_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody8_m68k.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-ia64/ethereal-dev_0.9.4-1woody8_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody8_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody8_ia64.deb stable/main/binary-ia64/tethereal_0.9.4-1woody8_ia64.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-hppa/ethereal-common_0.9.4-1woody8_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody8_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody8_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody8_hppa.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-arm/ethereal-common_0.9.4-1woody8_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody8_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody8_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody8_arm.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-alpha/ethereal-common_0.9.4-1woody8_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody8_alpha.deb stable/main/binary-alpha/ethereal-dev_0.9.4-1woody8_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody8_alpha.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-i386/ethereal-dev_0.9.4-1woody8_i386.deb stable/main/source/ethereal_0.9.4-1woody8.diff.gz stable/main/source/ethereal_0.9.4-1woody8.dsc stable/main/binary-i386/tethereal_0.9.4-1woody8_i386.deb stable/main/binary-i386/ethereal-common_0.9.4-1woody8_i386.deb stable/main/binary-i386/ethereal_0.9.4-1woody8_i386.deb ethereal (0.9.4-1woody8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector (CAN-2004-0635) stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.3_sparc.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-s390/eterm_0.9.2-0pre2002042903.3_s390.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.3_powerpc.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.3_mipsel.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-mips/eterm_0.9.2-0pre2002042903.3_mips.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.3_m68k.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.3_ia64.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.3_hppa.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-arm/eterm_0.9.2-0pre2002042903.3_arm.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.3_alpha.deb eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-i386/eterm_0.9.2-0pre2002042903.3_i386.deb stable/main/source/eterm_0.9.2-0pre2002042903.3.dsc stable/main/source/eterm_0.9.2-0pre2002042903.3.tar.gz eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068] stable/main/binary-sparc/emil_2.1.0-beta9-11woody1_sparc.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-s390/emil_2.1.0-beta9-11woody1_s390.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-powerpc/emil_2.1.0-beta9-11woody1_powerpc.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-mipsel/emil_2.1.0-beta9-11woody1_mipsel.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-mips/emil_2.1.0-beta9-11woody1_mips.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-m68k/emil_2.1.0-beta9-11woody1_m68k.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-ia64/emil_2.1.0-beta9-11woody1_ia64.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-hppa/emil_2.1.0-beta9-11woody1_hppa.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-arm/emil_2.1.0-beta9-11woody1_arm.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-alpha/emil_2.1.0-beta9-11woody1_alpha.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/source/emil_2.1.0-beta9-11woody1.dsc stable/main/source/emil_2.1.0-beta9-11woody1.diff.gz stable/main/binary-i386/emil_2.1.0-beta9-11woody1_i386.deb emil (2.1.0-beta9-11woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Ulf Harnhammar to fix: - buffer overflows (CAN-2004-0152) - format string bugs (CAN-2004-0153) * Backport fix for #146106 from unstable to fix compilation with bison in 1.31 in woody stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.3_sparc.deb stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_sparc.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_s390.deb stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.3_s390.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.3_powerpc.deb stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_powerpc.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.3_mipsel.deb stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mipsel.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mips.deb stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.3_mips.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.3_m68k.deb stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_m68k.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_ia64.deb stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.3_ia64.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_hppa.deb stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.3_hppa.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_arm.deb stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.3_arm.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_alpha.deb stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.3_alpha.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.3_i386.deb stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.3.dsc stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.3.diff.gz stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_i386.deb ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Blars Blarson to fix unauthorised access to the admin CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913] stable/main/binary-sparc/debootstrap_0.1.17.7woody1_sparc.deb stable/main/binary-sparc/debootstrap-udeb_0.1.17.7woody1_sparc.udeb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-s390/debootstrap-udeb_0.1.17.7woody1_s390.udeb stable/main/binary-s390/debootstrap_0.1.17.7woody1_s390.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-powerpc/debootstrap-udeb_0.1.17.7woody1_powerpc.udeb stable/main/binary-powerpc/debootstrap_0.1.17.7woody1_powerpc.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-mipsel/debootstrap_0.1.17.7woody1_mipsel.deb stable/main/binary-mipsel/debootstrap-udeb_0.1.17.7woody1_mipsel.udeb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-mips/debootstrap-udeb_0.1.17.7woody1_mips.udeb stable/main/binary-mips/debootstrap_0.1.17.7woody1_mips.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-m68k/debootstrap-udeb_0.1.17.7woody1_m68k.udeb stable/main/binary-m68k/debootstrap_0.1.17.7woody1_m68k.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-ia64/debootstrap_0.1.17.7woody1_ia64.deb stable/main/binary-ia64/debootstrap-udeb_0.1.17.7woody1_ia64.udeb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-hppa/debootstrap-udeb_0.1.17.7woody1_hppa.udeb stable/main/binary-hppa/debootstrap_0.1.17.7woody1_hppa.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-arm/debootstrap_0.1.17.7woody1_arm.deb stable/main/binary-arm/debootstrap-udeb_0.1.17.7woody1_arm.udeb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-alpha/debootstrap-udeb_0.1.17.7woody1_alpha.udeb stable/main/binary-alpha/debootstrap_0.1.17.7woody1_alpha.deb debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-i386/debootstrap_0.1.17.7woody1_i386.deb stable/main/binary-i386/debootstrap-udeb_0.1.17.7woody1_i386.udeb stable/main/source/debootstrap_0.1.17.7woody1.dsc stable/main/source/debootstrap_0.1.17.7woody1.tar.gz debootstrap (0.1.17.7woody1) stable; urgency=medium * NMU * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing package dependency fixes, among others. * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8 are still straightforward. stable/main/binary-sparc/libsasl-krb4-mit_1.5.24-15woody3_sparc.deb stable/main/binary-sparc/libsasl-gssapi-mit_1.5.24-15woody3_sparc.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-s390/libsasl-krb4-mit_1.5.24-15woody3_s390.deb stable/main/binary-s390/libsasl-gssapi-mit_1.5.24-15woody3_s390.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-powerpc/libsasl-krb4-mit_1.5.24-15woody3_powerpc.deb stable/main/binary-powerpc/libsasl-gssapi-mit_1.5.24-15woody3_powerpc.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-mipsel/libsasl-gssapi-mit_1.5.24-15woody3_mipsel.deb stable/main/binary-mipsel/libsasl-krb4-mit_1.5.24-15woody3_mipsel.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-mips/libsasl-gssapi-mit_1.5.24-15woody3_mips.deb stable/main/binary-mips/libsasl-krb4-mit_1.5.24-15woody3_mips.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-m68k/libsasl-krb4-mit_1.5.24-15woody3_m68k.deb stable/main/binary-m68k/libsasl-gssapi-mit_1.5.24-15woody3_m68k.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-ia64/libsasl-gssapi-mit_1.5.24-15woody3_ia64.deb stable/main/binary-ia64/libsasl-krb4-mit_1.5.24-15woody3_ia64.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-hppa/libsasl-gssapi-mit_1.5.24-15woody3_hppa.deb stable/main/binary-hppa/libsasl-krb4-mit_1.5.24-15woody3_hppa.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-arm/libsasl-gssapi-mit_1.5.24-15woody3_arm.deb stable/main/binary-arm/libsasl-krb4-mit_1.5.24-15woody3_arm.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-alpha/libsasl-krb4-mit_1.5.24-15woody3_alpha.deb stable/main/binary-alpha/libsasl-gssapi-mit_1.5.24-15woody3_alpha.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-i386/libsasl-gssapi-mit_1.5.24-15woody3_i386.deb stable/main/source/cyrus-sasl-mit_1.5.24-15woody3.dsc stable/main/source/cyrus-sasl-mit_1.5.24-15woody3.diff.gz stable/main/binary-i386/libsasl-krb4-mit_1.5.24-15woody3_i386.deb cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-sparc/libsasl-digestmd5-plain_1.5.27-3.1woody5_sparc.deb stable/main/binary-sparc/sasl-bin_1.5.27-3.1woody5_sparc.deb stable/main/binary-sparc/libsasl-modules-plain_1.5.27-3.1woody5_sparc.deb stable/main/binary-sparc/libsasl7_1.5.27-3.1woody5_sparc.deb stable/main/binary-sparc/libsasl-dev_1.5.27-3.1woody5_sparc.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-s390/sasl-bin_1.5.27-3.1woody5_s390.deb stable/main/binary-s390/libsasl-modules-plain_1.5.27-3.1woody5_s390.deb stable/main/binary-s390/libsasl7_1.5.27-3.1woody5_s390.deb stable/main/binary-s390/libsasl-dev_1.5.27-3.1woody5_s390.deb stable/main/binary-s390/libsasl-digestmd5-plain_1.5.27-3.1woody5_s390.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-powerpc/libsasl-digestmd5-plain_1.5.27-3.1woody5_powerpc.deb stable/main/binary-powerpc/libsasl-modules-plain_1.5.27-3.1woody5_powerpc.deb stable/main/binary-powerpc/libsasl-dev_1.5.27-3.1woody5_powerpc.deb stable/main/binary-powerpc/libsasl7_1.5.27-3.1woody5_powerpc.deb stable/main/binary-powerpc/sasl-bin_1.5.27-3.1woody5_powerpc.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-mipsel/libsasl-dev_1.5.27-3.1woody5_mipsel.deb stable/main/binary-mipsel/libsasl-digestmd5-plain_1.5.27-3.1woody5_mipsel.deb stable/main/binary-mipsel/sasl-bin_1.5.27-3.1woody5_mipsel.deb stable/main/binary-mipsel/libsasl7_1.5.27-3.1woody5_mipsel.deb stable/main/binary-mipsel/libsasl-modules-plain_1.5.27-3.1woody5_mipsel.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-mips/libsasl-dev_1.5.27-3.1woody5_mips.deb stable/main/binary-mips/libsasl-modules-plain_1.5.27-3.1woody5_mips.deb stable/main/binary-mips/libsasl-digestmd5-plain_1.5.27-3.1woody5_mips.deb stable/main/binary-mips/sasl-bin_1.5.27-3.1woody5_mips.deb stable/main/binary-mips/libsasl7_1.5.27-3.1woody5_mips.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-m68k/libsasl-digestmd5-plain_1.5.27-3.1woody5_m68k.deb stable/main/binary-m68k/libsasl-modules-plain_1.5.27-3.1woody5_m68k.deb stable/main/binary-m68k/libsasl7_1.5.27-3.1woody5_m68k.deb stable/main/binary-m68k/libsasl-dev_1.5.27-3.1woody5_m68k.deb stable/main/binary-m68k/sasl-bin_1.5.27-3.1woody5_m68k.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-ia64/libsasl-dev_1.5.27-3.1woody5_ia64.deb stable/main/binary-ia64/libsasl7_1.5.27-3.1woody5_ia64.deb stable/main/binary-ia64/libsasl-modules-plain_1.5.27-3.1woody5_ia64.deb stable/main/binary-ia64/sasl-bin_1.5.27-3.1woody5_ia64.deb stable/main/binary-ia64/libsasl-digestmd5-plain_1.5.27-3.1woody5_ia64.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-hppa/libsasl-digestmd5-plain_1.5.27-3.1woody5_hppa.deb stable/main/binary-hppa/libsasl-dev_1.5.27-3.1woody5_hppa.deb stable/main/binary-hppa/sasl-bin_1.5.27-3.1woody5_hppa.deb stable/main/binary-hppa/libsasl-modules-plain_1.5.27-3.1woody5_hppa.deb stable/main/binary-hppa/libsasl7_1.5.27-3.1woody5_hppa.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-arm/sasl-bin_1.5.27-3.1woody5_arm.deb stable/main/binary-arm/libsasl7_1.5.27-3.1woody5_arm.deb stable/main/binary-arm/libsasl-modules-plain_1.5.27-3.1woody5_arm.deb stable/main/binary-arm/libsasl-dev_1.5.27-3.1woody5_arm.deb stable/main/binary-arm/libsasl-digestmd5-plain_1.5.27-3.1woody5_arm.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-alpha/sasl-bin_1.5.27-3.1woody5_alpha.deb stable/main/binary-alpha/libsasl7_1.5.27-3.1woody5_alpha.deb stable/main/binary-alpha/libsasl-modules-plain_1.5.27-3.1woody5_alpha.deb stable/main/binary-alpha/libsasl-dev_1.5.27-3.1woody5_alpha.deb stable/main/binary-alpha/libsasl-digestmd5-plain_1.5.27-3.1woody5_alpha.deb cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-i386/libsasl-dev_1.5.27-3.1woody5_i386.deb stable/main/binary-i386/libsasl7_1.5.27-3.1woody5_i386.deb stable/main/binary-i386/libsasl-modules-plain_1.5.27-3.1woody5_i386.deb stable/main/binary-i386/libsasl-digestmd5-plain_1.5.27-3.1woody5_i386.deb stable/main/source/cyrus-sasl_1.5.27-3.1woody5.dsc stable/main/binary-i386/sasl-bin_1.5.27-3.1woody5_i386.deb stable/main/source/cyrus-sasl_1.5.27-3.1woody5.diff.gz cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ensure that path is set to NULL if it isn't utilised through the environment variable. Thanks to Peter Stelmachovic for spotting this. stable/main/binary-sparc/cvs_1.11.1p1debian-9woody7_sparc.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-s390/cvs_1.11.1p1debian-9woody7_s390.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-powerpc/cvs_1.11.1p1debian-9woody7_powerpc.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-mipsel/cvs_1.11.1p1debian-9woody7_mipsel.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-mips/cvs_1.11.1p1debian-9woody7_mips.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-m68k/cvs_1.11.1p1debian-9woody7_m68k.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-ia64/cvs_1.11.1p1debian-9woody7_ia64.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-hppa/cvs_1.11.1p1debian-9woody7_hppa.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-arm/cvs_1.11.1p1debian-9woody7_arm.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-alpha/cvs_1.11.1p1debian-9woody7_alpha.deb cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-i386/cvs_1.11.1p1debian-9woody7_i386.deb stable/main/source/cvs_1.11.1p1debian-9woody7.dsc stable/main/source/cvs_1.11.1p1debian-9woody7.diff.gz cvs (1.11.1p1debian-9woody7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert Price to fix security problems: - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416] - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417] - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418] stable/main/binary-sparc/cupsys_1.1.14-5woody10_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.1.14-5woody10_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.1.14-5woody10_sparc.deb stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5woody10_sparc.deb stable/main/binary-sparc/cupsys-client_1.1.14-5woody10_sparc.deb stable/main/binary-sparc/libcupsys2_1.1.14-5woody10_sparc.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-s390/cupsys_1.1.14-5woody10_s390.deb stable/main/binary-s390/cupsys-client_1.1.14-5woody10_s390.deb stable/main/binary-s390/libcupsys2_1.1.14-5woody10_s390.deb stable/main/binary-s390/cupsys-pstoraster_1.1.14-5woody10_s390.deb stable/main/binary-s390/libcupsys2-dev_1.1.14-5woody10_s390.deb stable/main/binary-s390/cupsys-bsd_1.1.14-5woody10_s390.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5woody10_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.1.14-5woody10_powerpc.deb stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5woody10_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.1.14-5woody10_powerpc.deb stable/main/binary-powerpc/cupsys_1.1.14-5woody10_powerpc.deb stable/main/binary-powerpc/libcupsys2_1.1.14-5woody10_powerpc.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5woody10_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.1.14-5woody10_mipsel.deb stable/main/binary-mipsel/cupsys_1.1.14-5woody10_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.1.14-5woody10_mipsel.deb stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5woody10_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.1.14-5woody10_mipsel.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-mips/cupsys-pstoraster_1.1.14-5woody10_mips.deb stable/main/binary-mips/cupsys_1.1.14-5woody10_mips.deb stable/main/binary-mips/cupsys-client_1.1.14-5woody10_mips.deb stable/main/binary-mips/libcupsys2-dev_1.1.14-5woody10_mips.deb stable/main/binary-mips/libcupsys2_1.1.14-5woody10_mips.deb stable/main/binary-mips/cupsys-bsd_1.1.14-5woody10_mips.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5woody10_m68k.deb stable/main/binary-m68k/libcupsys2-dev_1.1.14-5woody10_m68k.deb stable/main/binary-m68k/cupsys_1.1.14-5woody10_m68k.deb stable/main/binary-m68k/cupsys-client_1.1.14-5woody10_m68k.deb stable/main/binary-m68k/cupsys-bsd_1.1.14-5woody10_m68k.deb stable/main/binary-m68k/libcupsys2_1.1.14-5woody10_m68k.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-ia64/libcupsys2-dev_1.1.14-5woody10_ia64.deb stable/main/binary-ia64/cupsys_1.1.14-5woody10_ia64.deb stable/main/binary-ia64/cupsys-client_1.1.14-5woody10_ia64.deb stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5woody10_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.1.14-5woody10_ia64.deb stable/main/binary-ia64/libcupsys2_1.1.14-5woody10_ia64.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5woody10_hppa.deb stable/main/binary-hppa/cupsys-client_1.1.14-5woody10_hppa.deb stable/main/binary-hppa/cupsys_1.1.14-5woody10_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.1.14-5woody10_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.1.14-5woody10_hppa.deb stable/main/binary-hppa/libcupsys2_1.1.14-5woody10_hppa.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-arm/libcupsys2_1.1.14-5woody10_arm.deb stable/main/binary-arm/libcupsys2-dev_1.1.14-5woody10_arm.deb stable/main/binary-arm/cupsys-bsd_1.1.14-5woody10_arm.deb stable/main/binary-arm/cupsys-pstoraster_1.1.14-5woody10_arm.deb stable/main/binary-arm/cupsys_1.1.14-5woody10_arm.deb stable/main/binary-arm/cupsys-client_1.1.14-5woody10_arm.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-alpha/libcupsys2_1.1.14-5woody10_alpha.deb stable/main/binary-alpha/cupsys_1.1.14-5woody10_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.1.14-5woody10_alpha.deb stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5woody10_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.1.14-5woody10_alpha.deb stable/main/binary-alpha/cupsys-client_1.1.14-5woody10_alpha.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-i386/cupsys-bsd_1.1.14-5woody10_i386.deb stable/main/binary-i386/cupsys-client_1.1.14-5woody10_i386.deb stable/main/binary-i386/cupsys_1.1.14-5woody10_i386.deb stable/main/binary-i386/libcupsys2_1.1.14-5woody10_i386.deb stable/main/source/cupsys_1.1.14-5woody10.dsc stable/main/binary-i386/cupsys-pstoraster_1.1.14-5woody10_i386.deb stable/main/source/cupsys_1.1.14-5woody10.diff.gz stable/main/binary-i386/libcupsys2-dev_1.1.14-5woody10_i386.deb cupsys (1.1.14-5woody10) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added another buffer overflow protection that was discovered missing by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888] stable/main/binary-sparc/crawl_4.0.0beta23-2woody1_sparc.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-s390/crawl_4.0.0beta23-2woody1_s390.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-powerpc/crawl_4.0.0beta23-2woody1_powerpc.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-mipsel/crawl_4.0.0beta23-2woody1_mipsel.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-mips/crawl_4.0.0beta23-2woody1_mips.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-m68k/crawl_4.0.0beta23-2woody1_m68k.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-ia64/crawl_4.0.0beta23-2woody1_ia64.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-hppa/crawl_4.0.0beta23-2woody1_hppa.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-arm/crawl_4.0.0beta23-2woody1_arm.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-alpha/crawl_4.0.0beta23-2woody1_alpha.deb crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/source/crawl_4.0.0beta23-2woody1.diff.gz stable/main/binary-i386/crawl_4.0.0beta23-2woody1_i386.deb stable/main/source/crawl_4.0.0beta23-2woody1.dsc crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high * Non maintainer upload by the Security Team. * Fix potential local security hole due to improper use of environmental variable which may allow local GID(games) compromise. stable/main/binary-sparc/courier-base_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-maildrop_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-ldap_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-authdaemon_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-authmysql_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-mta_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-pcp_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-pop_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-webadmin_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-debug_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-mlm_0.37.3-2.5_sparc.deb stable/main/binary-sparc/sqwebmail_0.37.3-2.5_sparc.deb stable/main/binary-sparc/courier-imap_1.4.3-2.5_sparc.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-s390/courier-authmysql_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-pop_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-ldap_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-debug_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-imap_1.4.3-2.5_s390.deb stable/main/binary-s390/courier-pcp_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-webadmin_0.37.3-2.5_s390.deb stable/main/binary-s390/sqwebmail_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-base_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-authdaemon_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-maildrop_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-mta_0.37.3-2.5_s390.deb stable/main/binary-s390/courier-mlm_0.37.3-2.5_s390.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-powerpc/courier-mlm_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/sqwebmail_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-base_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-authmysql_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-pop_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-webadmin_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-debug_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-ldap_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-mta_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-imap_1.4.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-pcp_0.37.3-2.5_powerpc.deb stable/main/binary-powerpc/courier-maildrop_0.37.3-2.5_powerpc.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-mipsel/courier-ldap_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-debug_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-authmysql_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-mta_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-webadmin_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-base_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-imap_1.4.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-pcp_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/sqwebmail_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-pop_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-maildrop_0.37.3-2.5_mipsel.deb stable/main/binary-mipsel/courier-mlm_0.37.3-2.5_mipsel.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-mips/courier-maildrop_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-pop_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-webadmin_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-mta_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-mlm_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-authmysql_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-base_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-authdaemon_0.37.3-2.5_mips.deb stable/main/binary-mips/sqwebmail_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-ldap_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-debug_0.37.3-2.5_mips.deb stable/main/binary-mips/courier-imap_1.4.3-2.5_mips.deb stable/main/binary-mips/courier-pcp_0.37.3-2.5_mips.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-m68k/courier-base_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-maildrop_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-webadmin_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-authmysql_0.37.3-2.5_m68k.deb stable/main/binary-m68k/sqwebmail_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-mlm_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-mta_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-debug_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-pcp_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-imap_1.4.3-2.5_m68k.deb stable/main/binary-m68k/courier-pop_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-ldap_0.37.3-2.5_m68k.deb stable/main/binary-m68k/courier-authdaemon_0.37.3-2.5_m68k.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-ia64/courier-webadmin_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-pop_0.37.3-2.5_ia64.deb stable/main/binary-ia64/sqwebmail_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-debug_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-mlm_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-mta_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-maildrop_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-base_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-authmysql_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-imap_1.4.3-2.5_ia64.deb stable/main/binary-ia64/courier-authdaemon_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-ldap_0.37.3-2.5_ia64.deb stable/main/binary-ia64/courier-pcp_0.37.3-2.5_ia64.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-hppa/sqwebmail_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-imap_1.4.3-2.5_hppa.deb stable/main/binary-hppa/courier-ldap_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-authmysql_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-webadmin_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-debug_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-mlm_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-mta_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-authdaemon_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-pcp_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-base_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-pop_0.37.3-2.5_hppa.deb stable/main/binary-hppa/courier-maildrop_0.37.3-2.5_hppa.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-arm/courier-maildrop_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-imap_1.4.3-2.5_arm.deb stable/main/binary-arm/courier-debug_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-ldap_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-authmysql_0.37.3-2.5_arm.deb stable/main/binary-arm/sqwebmail_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-mlm_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-pcp_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-authdaemon_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-mta_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-pop_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-base_0.37.3-2.5_arm.deb stable/main/binary-arm/courier-webadmin_0.37.3-2.5_arm.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-alpha/courier-authmysql_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-authdaemon_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-maildrop_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-mta_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-mlm_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-pcp_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-ldap_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-webadmin_0.37.3-2.5_alpha.deb stable/main/binary-alpha/sqwebmail_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-imap_1.4.3-2.5_alpha.deb stable/main/binary-alpha/courier-debug_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-base_0.37.3-2.5_alpha.deb stable/main/binary-alpha/courier-pop_0.37.3-2.5_alpha.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-i386/courier-authdaemon_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-debug_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-mta_0.37.3-2.5_i386.deb stable/main/source/courier_0.37.3-2.5.diff.gz stable/main/binary-i386/sqwebmail_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-base_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-ldap_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-pcp_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-authmysql_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-webadmin_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-mlm_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-pop_0.37.3-2.5_i386.deb stable/main/binary-i386/courier-imap_1.4.3-2.5_i386.deb stable/main/binary-i386/courier-maildrop_0.37.3-2.5_i386.deb stable/main/source/courier_0.37.3-2.5.dsc stable/main/binary-all/courier-doc_0.37.3-2.5_all.deb courier (0.37.3-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number stable/main/binary-s390/conquest_7.1.1-6woody2_s390.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-powerpc/conquest_7.1.1-6woody2_powerpc.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-mipsel/conquest_7.1.1-6woody2_mipsel.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-mips/conquest_7.1.1-6woody2_mips.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-m68k/conquest_7.1.1-6woody2_m68k.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-ia64/conquest_7.1.1-6woody2_ia64.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-i386/conquest_7.1.1-6woody2_i386.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-hppa/conquest_7.1.1-6woody2_hppa.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-arm/conquest_7.1.1-6woody2_arm.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-alpha/conquest_7.1.1-6woody2_alpha.deb conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/source/conquest_7.1.1-6woody2.diff.gz stable/main/binary-sparc/conquest_7.1.1-6woody2_sparc.deb stable/main/source/conquest_7.1.1-6woody2.dsc conquest (7.1.1-6woody2) stable; urgency=medium * Fix group-checking in postinst and postrm. closes: #220650. stable/main/binary-sparc/cgiemail_1.6-14woody1_sparc.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-s390/cgiemail_1.6-14woody1_s390.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-powerpc/cgiemail_1.6-14woody1_powerpc.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-mipsel/cgiemail_1.6-14woody1_mipsel.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-mips/cgiemail_1.6-14woody1_mips.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-m68k/cgiemail_1.6-14woody1_m68k.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-ia64/cgiemail_1.6-14woody1_ia64.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-hppa/cgiemail_1.6-14woody1_hppa.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-arm/cgiemail_1.6-14woody1_arm.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-alpha/cgiemail_1.6-14woody1_alpha.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/source/cgiemail_1.6-14woody1.dsc stable/main/source/cgiemail_1.6-14woody1.diff.gz stable/main/binary-i386/cgiemail_1.6-14woody1_i386.deb cgiemail (1.6-14woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Filter nonprintable characters from parameters to prevent unauthorized use for transmitting email to arbitrary addresses (Closes: #222870) (CAN-2002-1575) stable/main/binary-sparc/cfs_1.4.1-7.1_sparc.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-s390/cfs_1.4.1-7.1_s390.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-powerpc/cfs_1.4.1-7.1_powerpc.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-mipsel/cfs_1.4.1-7.1_mipsel.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-mips/cfs_1.4.1-7.1_mips.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-m68k/cfs_1.4.1-7.1_m68k.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-ia64/cfs_1.4.1-7.1_ia64.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-i386/cfs_1.4.1-7.1_i386.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-hppa/cfs_1.4.1-7.1_hppa.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-arm/cfs_1.4.1-7.1_arm.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-alpha/cfs_1.4.1-7.1_alpha.deb cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/source/cfs_1.4.1-7.1.dsc stable/main/source/cfs_1.4.1-7.1.diff.gz cfs (1.4.1-7.1) stable; urgency=low * upload to woody; cfs is not usable on s390 due to an internal compiler error (most probably), see bug #151564; needs to be rebuilt with gcc-2.95 from woody 3.0r1; no more changes than this changelog entry. stable/main/binary-sparc/calife_2.8.4c-1woody1_sparc.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-s390/calife_2.8.4c-1woody1_s390.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-powerpc/calife_2.8.4c-1woody1_powerpc.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-mipsel/calife_2.8.4c-1woody1_mipsel.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-mips/calife_2.8.4c-1woody1_mips.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-m68k/calife_2.8.4c-1woody1_m68k.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-ia64/calife_2.8.4c-1woody1_ia64.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-hppa/calife_2.8.4c-1woody1_hppa.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-arm/calife_2.8.4c-1woody1_arm.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-alpha/calife_2.8.4c-1woody1_alpha.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/source/calife_2.8.4c-1woody1.dsc stable/main/source/calife_2.8.4c-1woody1.diff.gz stable/main/binary-i386/calife_2.8.4c-1woody1_i386.deb calife (2.8.4c-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from upstream 2.8.6 Closes: #235157 stable/main/binary-s390/bonsai_1.3+cvs20020224-1woody1_s390.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-powerpc/bonsai_1.3+cvs20020224-1woody1_powerpc.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-mipsel/bonsai_1.3+cvs20020224-1woody1_mipsel.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-mips/bonsai_1.3+cvs20020224-1woody1_mips.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-m68k/bonsai_1.3+cvs20020224-1woody1_m68k.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-ia64/bonsai_1.3+cvs20020224-1woody1_ia64.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-i386/bonsai_1.3+cvs20020224-1woody1_i386.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-hppa/bonsai_1.3+cvs20020224-1woody1_hppa.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-arm/bonsai_1.3+cvs20020224-1woody1_arm.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-alpha/bonsai_1.3+cvs20020224-1woody1_alpha.deb bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-sparc/bonsai_1.3+cvs20020224-1woody1_sparc.deb stable/main/source/bonsai_1.3+cvs20020224-1woody1.dsc stable/main/source/bonsai_1.3+cvs20020224-1woody1.diff.gz bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high * Fix security bug that allow remote execution of command as www-data user (see #142317 upstream bug). * Fix security bug that cause absolute path disclosure (see #187230 upstream bug). * Fix security bug that makes Bonsai vulnerable to cross-site scripting attacks (see #146244 and #163573 upstream bug). * Access to parameters page isn't any more allowed without password (see #45579 upstream bug) stable/main/binary-sparc/liblwres1_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/bind9_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/libdns5_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/libisccc0_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/lwresd_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/libisccfg0_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/libisc4_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/dnsutils_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/libbind-dev_9.2.1-2.woody.2_sparc.deb stable/main/binary-sparc/bind9-host_9.2.1-2.woody.2_sparc.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-s390/bind9_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/libdns5_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/liblwres1_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/bind9-host_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/dnsutils_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/lwresd_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/libbind-dev_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/libisc4_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/libisccc0_9.2.1-2.woody.2_s390.deb stable/main/binary-s390/libisccfg0_9.2.1-2.woody.2_s390.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-powerpc/libisccfg0_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/libisccc0_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/libbind-dev_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/libdns5_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/bind9_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/libisc4_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/bind9-host_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/dnsutils_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/liblwres1_9.2.1-2.woody.2_powerpc.deb stable/main/binary-powerpc/lwresd_9.2.1-2.woody.2_powerpc.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-mipsel/libdns5_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/liblwres1_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/libisc4_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/bind9_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/libbind-dev_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/dnsutils_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/lwresd_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/bind9-host_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/libisccfg0_9.2.1-2.woody.2_mipsel.deb stable/main/binary-mipsel/libisccc0_9.2.1-2.woody.2_mipsel.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-mips/bind9-host_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/libisc4_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/bind9_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/libdns5_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/libbind-dev_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/lwresd_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/liblwres1_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/dnsutils_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/libisccc0_9.2.1-2.woody.2_mips.deb stable/main/binary-mips/libisccfg0_9.2.1-2.woody.2_mips.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-m68k/libdns5_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/liblwres1_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/libisccc0_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/dnsutils_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/libbind-dev_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/bind9_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/libisc4_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/lwresd_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/bind9-host_9.2.1-2.woody.2_m68k.deb stable/main/binary-m68k/libisccfg0_9.2.1-2.woody.2_m68k.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-ia64/libbind-dev_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/libdns5_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/libisc4_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/lwresd_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/dnsutils_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/bind9-host_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/libisccfg0_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/libisccc0_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/bind9_9.2.1-2.woody.2_ia64.deb stable/main/binary-ia64/liblwres1_9.2.1-2.woody.2_ia64.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-hppa/libisc4_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/liblwres1_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/libbind-dev_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/libisccc0_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/libisccfg0_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/bind9_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/libdns5_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/dnsutils_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/lwresd_9.2.1-2.woody.2_hppa.deb stable/main/binary-hppa/bind9-host_9.2.1-2.woody.2_hppa.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-arm/bind9-host_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/libbind-dev_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/libdns5_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/libisc4_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/libisccfg0_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/bind9_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/liblwres1_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/libisccc0_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/lwresd_9.2.1-2.woody.2_arm.deb stable/main/binary-arm/dnsutils_9.2.1-2.woody.2_arm.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-alpha/bind9_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/bind9-host_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/liblwres1_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/lwresd_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/libisc4_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/libisccfg0_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/libisccc0_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/libdns5_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/libbind-dev_9.2.1-2.woody.2_alpha.deb stable/main/binary-alpha/dnsutils_9.2.1-2.woody.2_alpha.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-i386/bind9_9.2.1-2.woody.2_i386.deb stable/main/source/bind9_9.2.1-2.woody.2.dsc stable/main/binary-i386/libisccfg0_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/libisccc0_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/dnsutils_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/liblwres1_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/libisc4_9.2.1-2.woody.2_i386.deb stable/main/binary-all/bind9-doc_9.2.1-2.woody.2_all.deb stable/main/source/bind9_9.2.1-2.woody.2.diff.gz stable/main/binary-i386/bind9-host_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/libbind-dev_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/libdns5_9.2.1-2.woody.2_i386.deb stable/main/binary-i386/lwresd_9.2.1-2.woody.2_i386.deb bind9 (1:9.2.1-2.woody.2) stable; urgency=low * No change upload to clean up parser errors.... Closes: #179311 stable/main/binary-sparc/bind_8.3.3-2.0woody2_sparc.deb stable/main/binary-sparc/bind-dev_8.3.3-2.0woody2_sparc.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-s390/bind_8.3.3-2.0woody2_s390.deb stable/main/binary-s390/bind-dev_8.3.3-2.0woody2_s390.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-powerpc/bind_8.3.3-2.0woody2_powerpc.deb stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody2_powerpc.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-mipsel/bind_8.3.3-2.0woody2_mipsel.deb stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody2_mipsel.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-mips/bind_8.3.3-2.0woody2_mips.deb stable/main/binary-mips/bind-dev_8.3.3-2.0woody2_mips.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-m68k/bind-dev_8.3.3-2.0woody2_m68k.deb stable/main/binary-m68k/bind_8.3.3-2.0woody2_m68k.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-ia64/bind_8.3.3-2.0woody2_ia64.deb stable/main/binary-ia64/bind-dev_8.3.3-2.0woody2_ia64.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-hppa/bind_8.3.3-2.0woody2_hppa.deb stable/main/binary-hppa/bind-dev_8.3.3-2.0woody2_hppa.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-arm/bind-dev_8.3.3-2.0woody2_arm.deb stable/main/binary-arm/bind_8.3.3-2.0woody2_arm.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-alpha/bind-dev_8.3.3-2.0woody2_alpha.deb stable/main/binary-alpha/bind_8.3.3-2.0woody2_alpha.deb bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/main/binary-i386/bind-dev_8.3.3-2.0woody2_i386.deb stable/main/source/bind_8.3.3-2.0woody2.diff.gz stable/main/binary-i386/bind_8.3.3-2.0woody2_i386.deb stable/main/binary-all/bind-doc_8.3.3-2.0woody2_all.deb stable/main/source/bind_8.3.3-2.0woody2.dsc bind (1:8.3.3-2.0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cache poisoning vulnerability (CAN-2003-0914) [src/bin/named/ns_resp.c] stable/contrib/binary-sparc/atari800_1.2.2-1woody2_sparc.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-s390/atari800_1.2.2-1woody2_s390.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-powerpc/atari800_1.2.2-1woody2_powerpc.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-mips/atari800_1.2.2-1woody2_mips.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-m68k/atari800_1.2.2-1woody2_m68k.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-ia64/atari800_1.2.2-1woody2_ia64.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-hppa/atari800_1.2.2-1woody2_hppa.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-arm/atari800_1.2.2-1woody2_arm.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/binary-alpha/atari800_1.2.2-1woody2_alpha.deb atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/contrib/source/atari800_1.2.2-1woody2.dsc stable/contrib/binary-i386/atari800_1.2.2-1woody2_i386.deb stable/contrib/source/atari800_1.2.2-1woody2.diff.gz atari800 (1.2.2-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update src/config.{guess,sub} to fix build on mipsel stable/main/binary-sparc/aspell_0.33.7.1.1-9_sparc.deb stable/main/binary-sparc/aspell-en_0.33.7.1.1-9_sparc.deb stable/main/binary-sparc/libaspell10_0.33.7.1.1-9_sparc.deb stable/main/binary-sparc/libaspell-dev_0.33.7.1.1-9_sparc.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-s390/libaspell10_0.33.7.1.1-9_s390.deb stable/main/binary-s390/aspell_0.33.7.1.1-9_s390.deb stable/main/binary-s390/aspell-en_0.33.7.1.1-9_s390.deb stable/main/binary-s390/libaspell-dev_0.33.7.1.1-9_s390.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-powerpc/libaspell10_0.33.7.1.1-9_powerpc.deb stable/main/binary-powerpc/aspell_0.33.7.1.1-9_powerpc.deb stable/main/binary-powerpc/aspell-en_0.33.7.1.1-9_powerpc.deb stable/main/binary-powerpc/libaspell-dev_0.33.7.1.1-9_powerpc.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-m68k/aspell_0.33.7.1.1-9_m68k.deb stable/main/binary-m68k/libaspell10_0.33.7.1.1-9_m68k.deb stable/main/binary-m68k/libaspell-dev_0.33.7.1.1-9_m68k.deb stable/main/binary-m68k/aspell-en_0.33.7.1.1-9_m68k.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-ia64/libaspell10_0.33.7.1.1-9_ia64.deb stable/main/binary-ia64/libaspell-dev_0.33.7.1.1-9_ia64.deb stable/main/binary-ia64/aspell_0.33.7.1.1-9_ia64.deb stable/main/binary-ia64/aspell-en_0.33.7.1.1-9_ia64.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-arm/aspell-en_0.33.7.1.1-9_arm.deb stable/main/binary-arm/aspell_0.33.7.1.1-9_arm.deb stable/main/binary-arm/libaspell10_0.33.7.1.1-9_arm.deb stable/main/binary-arm/libaspell-dev_0.33.7.1.1-9_arm.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-alpha/aspell-en_0.33.7.1.1-9_alpha.deb stable/main/binary-alpha/libaspell10_0.33.7.1.1-9_alpha.deb stable/main/binary-alpha/libaspell-dev_0.33.7.1.1-9_alpha.deb stable/main/binary-alpha/aspell_0.33.7.1.1-9_alpha.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-i386/aspell-en_0.33.7.1.1-9_i386.deb stable/main/source/aspell_0.33.7.1.1-9.dsc stable/main/source/aspell_0.33.7.1.1.orig.tar.gz stable/main/binary-i386/libaspell10_0.33.7.1.1-9_i386.deb stable/main/binary-i386/libaspell-dev_0.33.7.1.1-9_i386.deb stable/main/binary-all/aspell-doc_0.33.7.1.1-9_all.deb stable/main/source/aspell_0.33.7.1.1-9.diff.gz stable/main/binary-i386/aspell_0.33.7.1.1-9_i386.deb aspell (0.33.7.1.1-9) stable; urgency=low * Repackaged upstream source tarball with a newer version of SCOWL, the wordlists making up aspell-en, that has the questionably licensed wordlists removed. The aspell source package is now unquestionably 100% DFSG-compliant. * Gave aspell-en its own copyright file. It's not LGPL but rather the SCOWL conglomerate license. stable/main/binary-sparc/aptitude_0.2.11.1-4_sparc.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-s390/aptitude_0.2.11.1-4_s390.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-powerpc/aptitude_0.2.11.1-4_powerpc.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-m68k/aptitude_0.2.11.1-4_m68k.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-ia64/aptitude_0.2.11.1-4_ia64.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-hppa/aptitude_0.2.11.1-4_hppa.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-arm/aptitude_0.2.11.1-4_arm.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-alpha/aptitude_0.2.11.1-4_alpha.deb aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/source/aptitude_0.2.11.1-4.diff.gz stable/main/binary-i386/aptitude_0.2.11.1-4_i386.deb stable/main/source/aptitude_0.2.11.1-4.dsc aptitude (0.2.11.1-4) stable; urgency=low * Rebuild for stable-proposed-updates...should have done this a couple years ago, but better late than never. This upgrade is needed to cleanly upgrade from Woody to Sarge. See bug #151701 for details. stable/main/binary-sparc/apache_1.3.26-0woody5_sparc.deb stable/main/binary-sparc/apache-dev_1.3.26-0woody5_sparc.deb stable/main/binary-sparc/apache-common_1.3.26-0woody5_sparc.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-s390/apache-dev_1.3.26-0woody5_s390.deb stable/main/binary-s390/apache-common_1.3.26-0woody5_s390.deb stable/main/binary-s390/apache_1.3.26-0woody5_s390.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-powerpc/apache-common_1.3.26-0woody5_powerpc.deb stable/main/binary-powerpc/apache_1.3.26-0woody5_powerpc.deb stable/main/binary-powerpc/apache-dev_1.3.26-0woody5_powerpc.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-mipsel/apache_1.3.26-0woody5_mipsel.deb stable/main/binary-mipsel/apache-dev_1.3.26-0woody5_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.26-0woody5_mipsel.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-mips/apache-common_1.3.26-0woody5_mips.deb stable/main/binary-mips/apache-dev_1.3.26-0woody5_mips.deb stable/main/binary-mips/apache_1.3.26-0woody5_mips.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-m68k/apache-common_1.3.26-0woody5_m68k.deb stable/main/binary-m68k/apache_1.3.26-0woody5_m68k.deb stable/main/binary-m68k/apache-dev_1.3.26-0woody5_m68k.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-ia64/apache-common_1.3.26-0woody5_ia64.deb stable/main/binary-ia64/apache-dev_1.3.26-0woody5_ia64.deb stable/main/binary-ia64/apache_1.3.26-0woody5_ia64.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-hppa/apache-common_1.3.26-0woody5_hppa.deb stable/main/binary-hppa/apache_1.3.26-0woody5_hppa.deb stable/main/binary-hppa/apache-dev_1.3.26-0woody5_hppa.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-arm/apache-dev_1.3.26-0woody5_arm.deb stable/main/binary-arm/apache_1.3.26-0woody5_arm.deb stable/main/binary-arm/apache-common_1.3.26-0woody5_arm.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-alpha/apache-common_1.3.26-0woody5_alpha.deb stable/main/binary-alpha/apache-dev_1.3.26-0woody5_alpha.deb stable/main/binary-alpha/apache_1.3.26-0woody5_alpha.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed stable/main/binary-i386/apache_1.3.26-0woody5_i386.deb stable/main/source/apache_1.3.26-0woody5.dsc stable/main/binary-i386/apache-common_1.3.26-0woody5_i386.deb stable/main/binary-all/apache-doc_1.3.26-0woody5_all.deb stable/main/source/apache_1.3.26-0woody5.diff.gz stable/main/binary-i386/apache-dev_1.3.26-0woody5_i386.deb apache (1.3.26-0woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Increment version number to pass a version which was accepted but not installed ========================================= Thu, 20 Nov 2003 - Debian 3.0r2 released ========================================= Removed the following packages from stable: aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc aspell-doc | 0.33.7.1-8 | all aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The license incorrectly says that it's LGPL but it is in fact a unique license which is non-DFSG-free." -- cyrus-sasl2 | 2.1.2-2 | source libsasl2 | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-dev | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-digestmd5-plain | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc libsasl2-modules-plain | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc sasl2-bin | 2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The library has some minor security problems and according to the maintainer some other problems as well, i.e. it could not work with software in testing/unstable which requires it either. All of the SASL-using software in stable uses cyrus-sasl, not cyrus-sasl2." -- micq | 0.4.9-0woody2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "The library has some minor security problems and according to Any version: Serious copyright violation, hence, removing. It's been removed from unstable and testing already. See Bug#167606 and Bug#194784" -- mindi | 0.58.r5-1 | alpha, arm, hppa, ia64, m68k, mips, mipsel, powerpc, s390, sparc (Reason: as requested by Stable Release Manager) "mindi is i386-centric since it uses lilo. It was only accidently set to arch=any" -- rocks-n-diamonds | 2.0.0-0.2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, s390, sparc rocks-n-diamonds | 2.0.0-0.2.1 | powerpc (Reason: as requested by Stable Release Manager) "Rocks-N-Diamonds contains sound, graphics and level data which violate section 2.3 of the Debian policy manual. Some of the game content originates with commercial sources that have not provided explicit permission for their reuse." -- python-tmda | 0.51-1 | all tmda | 0.51-1 | source, all (Reason: as requested by Stable Release Manager) "Bug#219361: please remove tmda from stable" -- zblast-svgalib | 1.2pre-5 | alpha (Reason: as requested by Stable Release Manager) "The alpha build failed completely because svgalib doesn't exist on alpha anymore in woody (i.e., its build-depends could not even be met), so I had to disable it. Hence, the alpha package needs to be removed." ------ stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.4_sparc.deb stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.4_sparc.deb stable/main/binary-sparc/openssl_0.9.6c-2.woody.4_sparc.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.4_s390.deb stable/main/binary-s390/openssl_0.9.6c-2.woody.4_s390.deb stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.4_s390.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.4_powerpc.deb stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.4_powerpc.deb stable/main/binary-powerpc/openssl_0.9.6c-2.woody.4_powerpc.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-mipsel/openssl_0.9.6c-2.woody.4_mipsel.deb stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.4_mipsel.deb stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.4_mipsel.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.4_mips.deb stable/main/binary-mips/openssl_0.9.6c-2.woody.4_mips.deb stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.4_mips.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.4_m68k.deb stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.4_m68k.deb stable/main/binary-m68k/openssl_0.9.6c-2.woody.4_m68k.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-ia64/openssl_0.9.6c-2.woody.4_ia64.deb stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.4_ia64.deb stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.4_ia64.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.4_hppa.deb stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.4_hppa.deb stable/main/binary-hppa/openssl_0.9.6c-2.woody.4_hppa.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.4_arm.deb stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.4_arm.deb stable/main/binary-arm/openssl_0.9.6c-2.woody.4_arm.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-alpha/openssl_0.9.6c-2.woody.4_alpha.deb stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.4_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.4_alpha.deb openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/source/openssl_0.9.6c-2.woody.4.dsc stable/main/binary-i386/openssl_0.9.6c-2.woody.4_i386.deb stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.4_i386.deb stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.4_i386.deb stable/main/binary-all/ssleay_0.9.6c-2.woody.4_all.deb stable/main/source/openssl_0.9.6c-2.woody.4.diff.gz openssl (0.9.6c-2.woody.4) stable-security; urgency=low * Non-maintainer upload by the Security Team * Apply upstream changes from CVS to fix ASN1 parsing bugs documented in CAN-2003-0544 and CAN-2003-0543 stable/main/binary-sparc/nhfsstone_1.0-2woody1_sparc.deb stable/main/binary-sparc/nfs-kernel-server_1.0-2woody1_sparc.deb stable/main/binary-sparc/nfs-common_1.0-2woody1_sparc.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-s390/nhfsstone_1.0-2woody1_s390.deb stable/main/binary-s390/nfs-kernel-server_1.0-2woody1_s390.deb stable/main/binary-s390/nfs-common_1.0-2woody1_s390.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody1_powerpc.deb stable/main/binary-powerpc/nhfsstone_1.0-2woody1_powerpc.deb stable/main/binary-powerpc/nfs-common_1.0-2woody1_powerpc.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody1_mipsel.deb stable/main/binary-mipsel/nhfsstone_1.0-2woody1_mipsel.deb stable/main/binary-mipsel/nfs-common_1.0-2woody1_mipsel.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-mips/nfs-kernel-server_1.0-2woody1_mips.deb stable/main/binary-mips/nhfsstone_1.0-2woody1_mips.deb stable/main/binary-mips/nfs-common_1.0-2woody1_mips.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-m68k/nfs-kernel-server_1.0-2woody1_m68k.deb stable/main/binary-m68k/nfs-common_1.0-2woody1_m68k.deb stable/main/binary-m68k/nhfsstone_1.0-2woody1_m68k.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-ia64/nfs-kernel-server_1.0-2woody1_ia64.deb stable/main/binary-ia64/nhfsstone_1.0-2woody1_ia64.deb stable/main/binary-ia64/nfs-common_1.0-2woody1_ia64.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-hppa/nhfsstone_1.0-2woody1_hppa.deb stable/main/binary-hppa/nfs-kernel-server_1.0-2woody1_hppa.deb stable/main/binary-hppa/nfs-common_1.0-2woody1_hppa.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-arm/nfs-common_1.0-2woody1_arm.deb stable/main/binary-arm/nhfsstone_1.0-2woody1_arm.deb stable/main/binary-arm/nfs-kernel-server_1.0-2woody1_arm.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-alpha/nfs-common_1.0-2woody1_alpha.deb stable/main/binary-alpha/nfs-kernel-server_1.0-2woody1_alpha.deb stable/main/binary-alpha/nhfsstone_1.0-2woody1_alpha.deb nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/source/nfs-utils_1.0-2woody1.tar.gz stable/main/binary-i386/nfs-common_1.0-2woody1_i386.deb stable/main/binary-i386/nhfsstone_1.0-2woody1_i386.deb stable/main/binary-i386/nfs-kernel-server_1.0-2woody1_i386.deb stable/main/source/nfs-utils_1.0-2woody1.dsc nfs-utils (1:1.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252) [support/nfs/xlog.c] stable/main/binary-sparc/zlib1g_1.1.4-1.0woody0_sparc.deb stable/main/binary-sparc/zlib-bin_1.1.4-1.0woody0_sparc.deb stable/main/binary-sparc/zlib1g-dev_1.1.4-1.0woody0_sparc.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-s390/zlib-bin_1.1.4-1.0woody0_s390.deb stable/main/binary-s390/zlib1g-dev_1.1.4-1.0woody0_s390.deb stable/main/binary-s390/zlib1g_1.1.4-1.0woody0_s390.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-powerpc/zlib1g_1.1.4-1.0woody0_powerpc.deb stable/main/binary-powerpc/zlib1g-dev_1.1.4-1.0woody0_powerpc.deb stable/main/binary-powerpc/zlib-bin_1.1.4-1.0woody0_powerpc.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-mipsel/zlib-bin_1.1.4-1.0woody0_mipsel.deb stable/main/binary-mipsel/zlib1g-dev_1.1.4-1.0woody0_mipsel.deb stable/main/binary-mipsel/zlib1g_1.1.4-1.0woody0_mipsel.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-mips/zlib1g-dev_1.1.4-1.0woody0_mips.deb stable/main/binary-mips/zlib-bin_1.1.4-1.0woody0_mips.deb stable/main/binary-mips/zlib1g_1.1.4-1.0woody0_mips.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-m68k/zlib1g-dev_1.1.4-1.0woody0_m68k.deb stable/main/binary-m68k/zlib1g_1.1.4-1.0woody0_m68k.deb stable/main/binary-m68k/zlib-bin_1.1.4-1.0woody0_m68k.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-ia64/zlib1g_1.1.4-1.0woody0_ia64.deb stable/main/binary-ia64/zlib1g-dev_1.1.4-1.0woody0_ia64.deb stable/main/binary-ia64/zlib-bin_1.1.4-1.0woody0_ia64.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-hppa/zlib-bin_1.1.4-1.0woody0_hppa.deb stable/main/binary-hppa/zlib1g-dev_1.1.4-1.0woody0_hppa.deb stable/main/binary-hppa/zlib1g_1.1.4-1.0woody0_hppa.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-arm/zlib-bin_1.1.4-1.0woody0_arm.deb stable/main/binary-arm/zlib1g-dev_1.1.4-1.0woody0_arm.deb stable/main/binary-arm/zlib1g_1.1.4-1.0woody0_arm.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-alpha/zlib1g-dev_1.1.4-1.0woody0_alpha.deb stable/main/binary-alpha/zlib1g_1.1.4-1.0woody0_alpha.deb stable/main/binary-alpha/zlib-bin_1.1.4-1.0woody0_alpha.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-i386/zlib-bin_1.1.4-1.0woody0_i386.deb stable/main/binary-i386/zlib1-altdev_1.1.4-1.0woody0_i386.deb stable/main/binary-i386/zlib1g_1.1.4-1.0woody0_i386.deb stable/main/source/zlib_1.1.4-1.0woody0.diff.gz stable/main/binary-i386/zlib1_1.1.4-1.0woody0_i386.deb stable/main/source/zlib_1.1.4-1.0woody0.dsc stable/main/binary-i386/zlib1g-dev_1.1.4-1.0woody0_i386.deb zlib (1:1.1.4-1.0woody0) stable; urgency=low * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows (closes: #184763). * Remove user Emacs variables from changelog. stable/main/binary-sparc/zblast-x11_1.2pre-5woody2_sparc.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-s390/zblast-x11_1.2pre-5woody2_s390.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-powerpc/zblast-x11_1.2pre-5woody2_powerpc.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-mipsel/zblast-x11_1.2pre-5woody2_mipsel.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-mips/zblast-x11_1.2pre-5woody2_mips.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-m68k/zblast-x11_1.2pre-5woody2_m68k.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-ia64/zblast-x11_1.2pre-5woody2_ia64.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-hppa/zblast-x11_1.2pre-5woody2_hppa.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-arm/zblast-x11_1.2pre-5woody2_arm.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-alpha/zblast-x11_1.2pre-5woody2_alpha.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-i386/zblast-svgalib_1.2pre-5woody2_i386.deb stable/main/binary-all/zblast-data_1.2pre-5woody2_all.deb stable/main/source/zblast_1.2pre-5woody2.diff.gz stable/main/source/zblast_1.2pre-5woody2.dsc stable/main/binary-i386/zblast-x11_1.2pre-5woody2_i386.deb zblast (1.2pre-5woody2) stable-security; urgency=high * Fix alpha build by disabling svgalib; it doesn't exist on alpha anymore stable/main/binary-sparc/xtokkaetama_1.0b-6woody2_sparc.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-s390/xtokkaetama_1.0b-6woody2_s390.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-powerpc/xtokkaetama_1.0b-6woody2_powerpc.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-mipsel/xtokkaetama_1.0b-6woody2_mipsel.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-mips/xtokkaetama_1.0b-6woody2_mips.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-m68k/xtokkaetama_1.0b-6woody2_m68k.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-ia64/xtokkaetama_1.0b-6woody2_ia64.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-hppa/xtokkaetama_1.0b-6woody2_hppa.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-arm/xtokkaetama_1.0b-6woody2_arm.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-alpha/xtokkaetama_1.0b-6woody2_alpha.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/source/xtokkaetama_1.0b-6woody2.dsc stable/main/source/xtokkaetama_1.0b-6woody2.diff.gz stable/main/binary-i386/xtokkaetama_1.0b-6woody2_i386.deb xtokkaetama (1.0b-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname (CAN-2003-0652) stable/main/binary-s390/xpdf-reader_1.00-3.1_s390.deb stable/main/binary-s390/xpdf-utils_1.00-3.1_s390.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-powerpc/xpdf-utils_1.00-3.1_powerpc.deb stable/main/binary-powerpc/xpdf-reader_1.00-3.1_powerpc.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-mipsel/xpdf-utils_1.00-3.1_mipsel.deb stable/main/binary-mipsel/xpdf-reader_1.00-3.1_mipsel.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-mips/xpdf-reader_1.00-3.1_mips.deb stable/main/binary-mips/xpdf-utils_1.00-3.1_mips.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-m68k/xpdf-utils_1.00-3.1_m68k.deb stable/main/binary-m68k/xpdf-reader_1.00-3.1_m68k.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-ia64/xpdf-utils_1.00-3.1_ia64.deb stable/main/binary-ia64/xpdf-reader_1.00-3.1_ia64.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-i386/xpdf-utils_1.00-3.1_i386.deb stable/main/binary-i386/xpdf-reader_1.00-3.1_i386.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-hppa/xpdf-reader_1.00-3.1_hppa.deb stable/main/binary-hppa/xpdf-utils_1.00-3.1_hppa.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-arm/xpdf-reader_1.00-3.1_arm.deb stable/main/binary-arm/xpdf-utils_1.00-3.1_arm.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-alpha/xpdf-reader_1.00-3.1_alpha.deb stable/main/binary-alpha/xpdf-utils_1.00-3.1_alpha.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-sparc/xpdf-utils_1.00-3.1_sparc.deb stable/main/binary-sparc/xpdf-reader_1.00-3.1_sparc.deb stable/main/source/xpdf_1.00-3.1.diff.gz stable/main/binary-all/xpdf-common_1.00-3.1_all.deb stable/main/source/xpdf_1.00-3.1.dsc stable/main/binary-all/xpdf_1.00-3.1_all.deb xpdf (1.00-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed integer overflow that can lead to executing arbitrary code stable/main/binary-sparc/xnc_4.4.7-3.woody.1_sparc.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-s390/xnc_4.4.7-3.woody.1_s390.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-powerpc/xnc_4.4.7-3.woody.1_powerpc.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-mipsel/xnc_4.4.7-3.woody.1_mipsel.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-mips/xnc_4.4.7-3.woody.1_mips.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-m68k/xnc_4.4.7-3.woody.1_m68k.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-ia64/xnc_4.4.7-3.woody.1_ia64.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-hppa/xnc_4.4.7-3.woody.1_hppa.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-arm/xnc_4.4.7-3.woody.1_arm.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-alpha/xnc_4.4.7-3.woody.1_alpha.deb xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/source/xnc_4.4.7-3.woody.1.diff.gz stable/main/binary-i386/xnc_4.4.7-3.woody.1_i386.deb stable/main/source/xnc_4.4.7-3.woody.1.dsc xnc (4.4.7-3.woody.1) stable; urgency=high * Version prepared for 3.0r1. Closes: #149191 * Previous version was causing Debian menu system breakage when installed. Update-menus was completly disfunctional. The fix is more than trivial - required me to change 2 chars in rules, and add "_" to two filenames. Please let this version go into stable. stable/main/binary-sparc/xgalaga_2.0.34-19woody1_sparc.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-s390/xgalaga_2.0.34-19woody1_s390.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-powerpc/xgalaga_2.0.34-19woody1_powerpc.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-mipsel/xgalaga_2.0.34-19woody1_mipsel.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-mips/xgalaga_2.0.34-19woody1_mips.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-m68k/xgalaga_2.0.34-19woody1_m68k.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-ia64/xgalaga_2.0.34-19woody1_ia64.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-hppa/xgalaga_2.0.34-19woody1_hppa.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-arm/xgalaga_2.0.34-19woody1_arm.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-alpha/xgalaga_2.0.34-19woody1_alpha.deb xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/source/xgalaga_2.0.34-19woody1.diff.gz stable/main/binary-i386/xgalaga_2.0.34-19woody1_i386.deb stable/main/source/xgalaga_2.0.34-19woody1.dsc xgalaga (2.0.34-19woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Steve Kemp to fix buffer overflow on long HOME environment variable (CAN-2003-0454) stable/main/binary-sparc/xfstt_1.2.1-3_sparc.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-s390/xfstt_1.2.1-3_s390.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-powerpc/xfstt_1.2.1-3_powerpc.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-mipsel/xfstt_1.2.1-3_mipsel.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-mips/xfstt_1.2.1-3_mips.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-m68k/xfstt_1.2.1-3_m68k.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-ia64/xfstt_1.2.1-3_ia64.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-hppa/xfstt_1.2.1-3_hppa.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-arm/xfstt_1.2.1-3_arm.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-alpha/xfstt_1.2.1-3_alpha.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/source/xfstt_1.2.1-3.tar.gz stable/main/source/xfstt_1.2.1-3.dsc stable/main/binary-i386/xfstt_1.2.1-3_i386.deb xfstt (1.2.1-3) stable-security; urgency=high * New Maintainer. * Fixed multiple buffer overflows in the network packet handling: CAN-2003-0581. * Fixed a possible security problem by checking the byteorder magic in the connection handshake: CAN-2003-0625, bugtraq id 8255. stable/main/binary-s390/xfsdump_2.0.1-2_s390.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-powerpc/xfsdump_2.0.1-2_powerpc.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-mipsel/xfsdump_2.0.1-2_mipsel.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-mips/xfsdump_2.0.1-2_mips.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-m68k/xfsdump_2.0.1-2_m68k.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-ia64/xfsdump_2.0.1-2_ia64.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-i386/xfsdump_2.0.1-2_i386.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-hppa/xfsdump_2.0.1-2_hppa.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-arm/xfsdump_2.0.1-2_arm.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-alpha/xfsdump_2.0.1-2_alpha.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/source/xfsdump_2.0.1-2.dsc stable/main/source/xfsdump_2.0.1-2.tar.gz stable/main/binary-sparc/xfsdump_2.0.1-2_sparc.deb xfsdump (2.0.1-2) stable-security; urgency=high * New release to fix security issues in interaction between xfsdump(8) and xfsdq(8). stable/main/binary-sparc/xterm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xutils_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xprt_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/proxymngr_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps1_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa3_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xnest_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/lbxproxy_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xdm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xbase-clients_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs-pic_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/x-window-system-core_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xfs_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xmh_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xfwp_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libdps-dev_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/libxaw7_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xserver-common_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xvfb_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/twm_4.1.0-16woody1_sparc.deb stable/main/binary-sparc/xlibs_4.1.0-16woody1_sparc.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-s390/xterm_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa3_4.1.0-16woody1_s390.deb stable/main/binary-s390/xvfb_4.1.0-16woody1_s390.deb stable/main/binary-s390/xbase-clients_4.1.0-16woody1_s390.deb stable/main/binary-s390/proxymngr_4.1.0-16woody1_s390.deb stable/main/binary-s390/lbxproxy_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps1_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xdm_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6_4.1.0-16woody1_s390.deb stable/main/binary-s390/xfwp_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs_4.1.0-16woody1_s390.deb stable/main/binary-s390/xmh_4.1.0-16woody1_s390.deb stable/main/binary-s390/x-window-system-core_4.1.0-16woody1_s390.deb stable/main/binary-s390/xnest_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/xprt_4.1.0-16woody1_s390.deb stable/main/binary-s390/xutils_4.1.0-16woody1_s390.deb stable/main/binary-s390/xserver-common_4.1.0-16woody1_s390.deb stable/main/binary-s390/twm_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-pic_4.1.0-16woody1_s390.deb stable/main/binary-s390/libdps1-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibs-dev_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody1_s390.deb stable/main/binary-s390/xfs_4.1.0-16woody1_s390.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xserver-common_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps1_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xterm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xdm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/proxymngr_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xvfb_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/twm_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xfs_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xutils_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xbase-clients_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xprt_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xfwp_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xnest_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xmh_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody1_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody1_mipsel.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-mips/libxaw6-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xutils_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa3_4.1.0-16woody1_mips.deb stable/main/binary-mips/xserver-xfree86_4.1.0-16woody1_mips.deb stable/main/binary-mips/x-window-system-core_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs_4.1.0-16woody1_mips.deb stable/main/binary-mips/xvfb_4.1.0-16woody1_mips.deb stable/main/binary-mips/twm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps1_4.1.0-16woody1_mips.deb stable/main/binary-mips/xterm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xdm_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xmh_4.1.0-16woody1_mips.deb stable/main/binary-mips/xserver-common_4.1.0-16woody1_mips.deb stable/main/binary-mips/xbase-clients_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw6_4.1.0-16woody1_mips.deb stable/main/binary-mips/xnest_4.1.0-16woody1_mips.deb stable/main/binary-mips/xfs_4.1.0-16woody1_mips.deb stable/main/binary-mips/xfwp_4.1.0-16woody1_mips.deb stable/main/binary-mips/proxymngr_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-pic_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps1-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libxaw7-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xprt_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/libdps-dev_4.1.0-16woody1_mips.deb stable/main/binary-mips/xlibs-dbg_4.1.0-16woody1_mips.deb stable/main/binary-mips/lbxproxy_4.1.0-16woody1_mips.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xdm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xbase-clients_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps1_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/x-window-system-core_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xterm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/proxymngr_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa3_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xfs_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/lbxproxy_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xvfb_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xmh_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xfwp_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw6_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-pic_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xserver-common_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xprt_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/libdps-dev_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xutils_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/twm_4.1.0-16woody1_m68k.deb stable/main/binary-m68k/xnest_4.1.0-16woody1_m68k.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa3_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps1_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/x-window-system-core_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xvfb_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xprt_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/lbxproxy_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xdm_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xbase-clients_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw6_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xfwp_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xmh_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xserver-common_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xterm_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xfs_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xnest_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xutils_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-pic_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/proxymngr_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibs-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/libxaw7_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody1_ia64.deb stable/main/binary-ia64/twm_4.1.0-16woody1_ia64.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-i386/lbxproxy_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa3_4.1.0-16woody1_i386.deb stable/main/binary-i386/xutils_4.1.0-16woody1_i386.deb stable/main/binary-i386/proxymngr_4.1.0-16woody1_i386.deb stable/main/binary-i386/xnest_4.1.0-16woody1_i386.deb stable/main/binary-i386/xbase-clients_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps1_4.1.0-16woody1_i386.deb stable/main/binary-i386/x-window-system-core_4.1.0-16woody1_i386.deb stable/main/binary-i386/xvfb_4.1.0-16woody1_i386.deb stable/main/binary-i386/xterm_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xprt_4.1.0-16woody1_i386.deb stable/main/binary-i386/xmh_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs_4.1.0-16woody1_i386.deb stable/main/binary-i386/xfwp_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xfs_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xserver-common_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps1-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xserver-xfree86_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-pic_4.1.0-16woody1_i386.deb stable/main/binary-i386/twm_4.1.0-16woody1_i386.deb stable/main/binary-i386/libxaw6-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xdm_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibs-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/libdps-dev_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody1_i386.deb stable/main/binary-i386/xlibmesa3_4.1.0-16woody1_i386.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-hppa/libxaw6_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xfwp_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xmh_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/twm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xdm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xprt_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xutils_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xserver-common_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xfs_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xnest_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xterm_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xvfb_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibmesa3_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps1_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/lbxproxy_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libxaw7_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/x-window-system-core_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xbase-clients_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/proxymngr_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xlibs-pic_4.1.0-16woody1_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody1_hppa.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-arm/xlibs-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/proxymngr_4.1.0-16woody1_arm.deb stable/main/binary-arm/xnest_4.1.0-16woody1_arm.deb stable/main/binary-arm/xbase-clients_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xserver-xfree86_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs-pic_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa3_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps1-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/xserver-common_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibs-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw7-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/xdm_4.1.0-16woody1_arm.deb stable/main/binary-arm/x-window-system-core_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6-dev_4.1.0-16woody1_arm.deb stable/main/binary-arm/lbxproxy_4.1.0-16woody1_arm.deb stable/main/binary-arm/twm_4.1.0-16woody1_arm.deb stable/main/binary-arm/xmh_4.1.0-16woody1_arm.deb stable/main/binary-arm/xprt_4.1.0-16woody1_arm.deb stable/main/binary-arm/xvfb_4.1.0-16woody1_arm.deb stable/main/binary-arm/xterm_4.1.0-16woody1_arm.deb stable/main/binary-arm/xfs_4.1.0-16woody1_arm.deb stable/main/binary-arm/xutils_4.1.0-16woody1_arm.deb stable/main/binary-arm/libdps1_4.1.0-16woody1_arm.deb stable/main/binary-arm/xfwp_4.1.0-16woody1_arm.deb stable/main/binary-arm/libxaw6_4.1.0-16woody1_arm.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xvfb_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa3_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xserver-common_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xutils_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps1_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/twm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/proxymngr_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xmh_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-pic_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xterm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xnest_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xprt_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xdm_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/x-window-system-core_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xbase-clients_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/lbxproxy_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xfwp_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xfs_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/libdps-dev_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibs_4.1.0-16woody1_alpha.deb stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody1_alpha.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-all/xfonts-scalable_4.1.0-16woody1_all.deb stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody1_all.deb stable/main/source/xfree86_4.1.0-16woody1.diff.gz stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xmh_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xfs_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xvfb_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/twm_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libdps1_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-pex_4.1.0-16woody1_all.deb stable/main/binary-all/xfree86-common_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xbase-clients_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-75dpi_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xprt_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xlib6g-dev_4.1.0-16woody1_all.deb stable/main/binary-powerpc/libdps-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xfwp_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-base_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xnest_4.1.0-16woody1_powerpc.deb stable/main/binary-all/x-window-system_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xutils_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xserver-common_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xdm_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xlib6g_4.1.0-16woody1_all.deb stable/main/binary-powerpc/proxymngr_4.1.0-16woody1_powerpc.deb stable/main/source/xfree86_4.1.0-16woody1.dsc stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibs_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xfonts-100dpi_4.1.0-16woody1_all.deb stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody1_all.deb stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/xterm_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-all/xspecs_4.1.0-16woody1_all.deb stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody1_powerpc.deb stable/main/binary-powerpc/libxaw6_4.1.0-16woody1_powerpc.deb xfree86 (4.1.0-16woody1) stable-security; urgency=high * Security update release. Resolves the following issues: + CAN-2003-0063 (xterm window title reporting can deceive user) + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack) + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning X session to read and write arbitrary shared memory segments) + CAN-2003-0730 (multiple integer overflows in the font libraries for XFree86 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks) * patch #069: new; disable xterm's window title reporting escape sequence * patch #070: new; fix term to ignore malformed DEC UDK escape sequences instead of locking up * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS: - Implement LocalClientCred() to return the credentials of local clients connected through Unix domain sockets on systems that have the required support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are implemented), and use that in ShmAttach() to grant access to the client. When client credentials are not available, require world accessibility. The original fix did not cover the case where the X server is started from an X display manager such as xdm. * patch #072: new; fixes for integer overflows in font libraries from upstream CVS: - fixes for potential integer overflows in font libraries (blexim, Matthieu Herrb). - For integer overflow tests, use SIZE_MAX which is more standard than SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems. Based on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646). * patch #400: resynced offsets in the wake of patch #071 stable/main/binary-sparc/xbl_1.0k-3woody2_sparc.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-s390/xbl_1.0k-3woody2_s390.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-powerpc/xbl_1.0k-3woody2_powerpc.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-mipsel/xbl_1.0k-3woody2_mipsel.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-mips/xbl_1.0k-3woody2_mips.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-m68k/xbl_1.0k-3woody2_m68k.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-ia64/xbl_1.0k-3woody2_ia64.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-hppa/xbl_1.0k-3woody2_hppa.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-arm/xbl_1.0k-3woody2_arm.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/binary-alpha/xbl_1.0k-3woody2_alpha.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/source/xbl_1.0k-3woody2.dsc stable/main/source/xbl_1.0k-3woody2.diff.gz stable/main/binary-i386/xbl_1.0k-3woody2_i386.deb xbl (1.0k-3woody2) stable-security; urgency=low * Fixed another buffer overflow reported by an anonymous user. stable/main/source/x-face-el_1.3.6.19-1woody1.dsc stable/main/source/x-face-el_1.3.6.19-1woody1.diff.gz stable/main/binary-all/x-face-el_1.3.6.19-1woody1_all.deb x-face-el (1.3.6.19-1woody1) stable-security; urgency=high * Fix insecure tempfile handling. (backport from 1.3.6.23) stable/main/binary-sparc/wu-ftpd_2.6.2-3woody2_sparc.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-s390/wu-ftpd_2.6.2-3woody2_s390.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody2_powerpc.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody2_mipsel.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-mips/wu-ftpd_2.6.2-3woody2_mips.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-m68k/wu-ftpd_2.6.2-3woody2_m68k.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-ia64/wu-ftpd_2.6.2-3woody2_ia64.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-hppa/wu-ftpd_2.6.2-3woody2_hppa.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-arm/wu-ftpd_2.6.2-3woody2_arm.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/binary-alpha/wu-ftpd_2.6.2-3woody2_alpha.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/source/wu-ftpd_2.6.2-3woody2.diff.gz stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody2_all.deb stable/main/source/wu-ftpd_2.6.2-3woody2.dsc stable/main/binary-i386/wu-ftpd_2.6.2-3woody2_i386.deb wu-ftpd (2.6.2-3woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prefix %s substitutions in ftpconversions with '--' to avoid option processing. In the case of tar, this would allow arbitrary command execution (CVE-1999-0997) stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.diff.gz stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.dsc stable/main/binary-all/wemi_1.14.0.20010802wemiko-1.3woody1_all.deb wemi (1.14.0.20010802wemiko-1.3woody1) stable; urgency=high * Non-maintainer upload by the Stable Release Manager * Only bump up the version number so it'll be accepted by katie stable/main/binary-sparc/webfs_1.17.2_sparc.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-s390/webfs_1.17.2_s390.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-powerpc/webfs_1.17.2_powerpc.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-mipsel/webfs_1.17.2_mipsel.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-mips/webfs_1.17.2_mips.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-m68k/webfs_1.17.2_m68k.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-ia64/webfs_1.17.2_ia64.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-hppa/webfs_1.17.2_hppa.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-arm/webfs_1.17.2_arm.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-alpha/webfs_1.17.2_alpha.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/source/webfs_1.17.2.dsc stable/main/source/webfs_1.17.2.tar.gz stable/main/binary-i386/webfs_1.17.2_i386.deb webfs (1.17.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows (CAN-2003-0833) * Disallow ".." as virtualhost name, to prevent file listing exposure (CAN-2003-0832) stable/main/binary-sparc/w3mmee-ssl_0.3.p23.3-1.5_sparc.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3mmee-ssl_0.3.p23.3-1.5_s390.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3mmee-ssl_0.3.p23.3-1.5_mipsel.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3mmee-ssl_0.3.p23.3-1.5_mips.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3mmee-ssl_0.3.p23.3-1.5_m68k.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-ia64/w3mmee-ssl_0.3.p23.3-1.5_ia64.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3mmee-ssl_0.3.p23.3-1.5_i386.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3mmee-ssl_0.3.p23.3-1.5_hppa.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3mmee-ssl_0.3.p23.3-1.5_arm.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3mmee-ssl_0.3.p23.3-1.5_alpha.deb w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3mmee-ssl_0.3.p23.3-1.5_powerpc.deb stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.dsc stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.diff.gz w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3mmee_0.3.p23.3-1.5_s390.deb stable/main/binary-s390/w3mmee-img_0.3.p23.3-1.5_s390.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3mmee_0.3.p23.3-1.5_powerpc.deb stable/main/binary-powerpc/w3mmee-img_0.3.p23.3-1.5_powerpc.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3mmee_0.3.p23.3-1.5_mipsel.deb stable/main/binary-mipsel/w3mmee-img_0.3.p23.3-1.5_mipsel.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3mmee_0.3.p23.3-1.5_mips.deb stable/main/binary-mips/w3mmee-img_0.3.p23.3-1.5_mips.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3mmee-img_0.3.p23.3-1.5_m68k.deb stable/main/binary-m68k/w3mmee_0.3.p23.3-1.5_m68k.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-ia64/w3mmee_0.3.p23.3-1.5_ia64.deb stable/main/binary-ia64/w3mmee-img_0.3.p23.3-1.5_ia64.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3mmee-img_0.3.p23.3-1.5_i386.deb stable/main/binary-i386/w3mmee_0.3.p23.3-1.5_i386.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3mmee_0.3.p23.3-1.5_hppa.deb stable/main/binary-hppa/w3mmee-img_0.3.p23.3-1.5_hppa.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3mmee-img_0.3.p23.3-1.5_arm.deb stable/main/binary-arm/w3mmee_0.3.p23.3-1.5_arm.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3mmee-img_0.3.p23.3-1.5_alpha.deb stable/main/binary-alpha/w3mmee_0.3.p23.3-1.5_alpha.deb w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/w3mmee-img_0.3.p23.3-1.5_sparc.deb stable/main/binary-sparc/w3mmee_0.3.p23.3-1.5_sparc.deb stable/main/source/w3mmee_0.3.p23.3-1.5.dsc stable/main/source/w3mmee_0.3.p23.3-1.5.diff.gz w3mmee (0.3.p23.3-1.5) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3m-ssl_0.3-2.4_s390.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3m-ssl_0.3-2.4_powerpc.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3m-ssl_0.3-2.4_mipsel.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3m-ssl_0.3-2.4_mips.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3m-ssl_0.3-2.4_m68k.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3m-ssl_0.3-2.4_i386.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3m-ssl_0.3-2.4_hppa.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3m-ssl_0.3-2.4_arm.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3m-ssl_0.3-2.4_alpha.deb w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/w3m-ssl_0.3-2.4_sparc.deb stable/main/source/w3m-ssl_0.3-2.4.diff.gz stable/main/source/w3m-ssl_0.3-2.4.dsc w3m-ssl (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-s390/w3m-img_0.3-2.4_s390.deb stable/main/binary-s390/w3m_0.3-2.4_s390.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-powerpc/w3m-img_0.3-2.4_powerpc.deb stable/main/binary-powerpc/w3m_0.3-2.4_powerpc.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mipsel/w3m-img_0.3-2.4_mipsel.deb stable/main/binary-mipsel/w3m_0.3-2.4_mipsel.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-mips/w3m-img_0.3-2.4_mips.deb stable/main/binary-mips/w3m_0.3-2.4_mips.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-m68k/w3m_0.3-2.4_m68k.deb stable/main/binary-m68k/w3m-img_0.3-2.4_m68k.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-i386/w3m_0.3-2.4_i386.deb stable/main/binary-i386/w3m-img_0.3-2.4_i386.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-hppa/w3m-img_0.3-2.4_hppa.deb stable/main/binary-hppa/w3m_0.3-2.4_hppa.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-arm/w3m_0.3-2.4_arm.deb stable/main/binary-arm/w3m-img_0.3-2.4_arm.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-alpha/w3m_0.3-2.4_alpha.deb stable/main/binary-alpha/w3m-img_0.3-2.4_alpha.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/source/w3m_0.3-2.4.dsc stable/main/binary-sparc/w3m_0.3-2.4_sparc.deb stable/main/source/w3m_0.3-2.4.diff.gz stable/main/binary-sparc/w3m-img_0.3-2.4_sparc.deb w3m (0.3-2.4) stable-security; urgency=high * Non-maintainer upload by the security team * Rebuilt for security.debian.org stable/main/binary-sparc/util-linux_2.11n-7_sparc.deb stable/main/binary-sparc/mount_2.11n-7_sparc.deb stable/main/binary-sparc/bsdutils_2.11n-7_sparc.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-s390/mount_2.11n-7_s390.deb stable/main/binary-s390/util-linux_2.11n-7_s390.deb stable/main/binary-s390/bsdutils_2.11n-7_s390.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-powerpc/bsdutils_2.11n-7_powerpc.deb stable/main/binary-powerpc/util-linux_2.11n-7_powerpc.deb stable/main/binary-powerpc/mount_2.11n-7_powerpc.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-mipsel/mount_2.11n-7_mipsel.deb stable/main/binary-mipsel/util-linux_2.11n-7_mipsel.deb stable/main/binary-mipsel/bsdutils_2.11n-7_mipsel.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-mips/util-linux_2.11n-7_mips.deb stable/main/binary-mips/bsdutils_2.11n-7_mips.deb stable/main/binary-mips/mount_2.11n-7_mips.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-m68k/mount_2.11n-7_m68k.deb stable/main/binary-m68k/util-linux_2.11n-7_m68k.deb stable/main/binary-m68k/bsdutils_2.11n-7_m68k.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-ia64/bsdutils_2.11n-7_ia64.deb stable/main/binary-ia64/util-linux_2.11n-7_ia64.deb stable/main/binary-ia64/mount_2.11n-7_ia64.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-hppa/bsdutils_2.11n-7_hppa.deb stable/main/binary-hppa/util-linux_2.11n-7_hppa.deb stable/main/binary-hppa/mount_2.11n-7_hppa.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-arm/mount_2.11n-7_arm.deb stable/main/binary-arm/bsdutils_2.11n-7_arm.deb stable/main/binary-arm/util-linux_2.11n-7_arm.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-alpha/mount_2.11n-7_alpha.deb stable/main/binary-alpha/util-linux_2.11n-7_alpha.deb stable/main/binary-alpha/bsdutils_2.11n-7_alpha.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-all/util-linux-locales_2.11n-7_all.deb stable/main/source/util-linux_2.11n-7.dsc stable/main/binary-i386/util-linux_2.11n-7_i386.deb stable/main/binary-i386/bsdutils_2.11n-7_i386.deb stable/main/source/util-linux_2.11n-7.diff.gz stable/main/binary-i386/mount_2.11n-7_i386.deb util-linux (2.11n-7) stable; urgency=low * GAH! The stupid woody-chroot, wasn't. stable/main/binary-sparc/unzip_5.50-1woody2_sparc.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-s390/unzip_5.50-1woody2_s390.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-powerpc/unzip_5.50-1woody2_powerpc.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-mipsel/unzip_5.50-1woody2_mipsel.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-mips/unzip_5.50-1woody2_mips.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-m68k/unzip_5.50-1woody2_m68k.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-ia64/unzip_5.50-1woody2_ia64.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-hppa/unzip_5.50-1woody2_hppa.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-arm/unzip_5.50-1woody2_arm.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-alpha/unzip_5.50-1woody2_alpha.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/source/unzip_5.50-1woody2.dsc stable/main/source/unzip_5.50-1woody2.diff.gz stable/main/binary-i386/unzip_5.50-1woody2_i386.deb unzip (5.50-1woody2) stable-security; urgency=high * Fixed "unzip directory traversal revisited" again (Closes: #206439). There was still a missing case that the previous patch didn't catch. Patch borrowed from unzip-5.50-33.src.rpm. * For reference, this is (still) CAN-2003-0282. stable/main/binary-sparc/typespeed_0.4.1-2.2_sparc.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-s390/typespeed_0.4.1-2.2_s390.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-powerpc/typespeed_0.4.1-2.2_powerpc.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-mipsel/typespeed_0.4.1-2.2_mipsel.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-mips/typespeed_0.4.1-2.2_mips.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-m68k/typespeed_0.4.1-2.2_m68k.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-ia64/typespeed_0.4.1-2.2_ia64.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-hppa/typespeed_0.4.1-2.2_hppa.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-arm/typespeed_0.4.1-2.2_arm.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-alpha/typespeed_0.4.1-2.2_alpha.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/source/typespeed_0.4.1-2.2.dsc stable/main/source/typespeed_0.4.1-2.2.diff.gz stable/main/binary-i386/typespeed_0.4.1-2.2_i386.deb typespeed (0.4.1-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix more buffer overflows in net_swapscore [network.c] stable/main/binary-sparc/traceroute-nanog_6.1.1-1.3_sparc.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-s390/traceroute-nanog_6.1.1-1.3_s390.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-powerpc/traceroute-nanog_6.1.1-1.3_powerpc.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-mipsel/traceroute-nanog_6.1.1-1.3_mipsel.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-mips/traceroute-nanog_6.1.1-1.3_mips.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-m68k/traceroute-nanog_6.1.1-1.3_m68k.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-ia64/traceroute-nanog_6.1.1-1.3_ia64.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-hppa/traceroute-nanog_6.1.1-1.3_hppa.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-arm/traceroute-nanog_6.1.1-1.3_arm.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/binary-alpha/traceroute-nanog_6.1.1-1.3_alpha.deb traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/main/source/traceroute-nanog_6.1.1-1.3.diff.gz stable/main/binary-i386/traceroute-nanog_6.1.1-1.3_i386.deb stable/main/source/traceroute-nanog_6.1.1-1.3.dsc traceroute-nanog (6.1.1-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453) * Spray mode still seems buggy, but hopefully not dangerous anymore. If any further bugs are found, it should simply be disabled, as it is a mess stable/contrib/source/tomcat4_4.0.3-3woody3.dsc stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody3_all.deb stable/contrib/binary-all/tomcat4_4.0.3-3woody3_all.deb stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody3_all.deb stable/contrib/source/tomcat4_4.0.3-3woody3.diff.gz tomcat4 (4.0.3-3woody3) stable-security; urgency=high * Include a patch from Aldrin Martoq which fixes a DoS attack (closes: #215506) * Correctly start tomcat4 when booting (closes: #198226) stable/contrib/source/tomcat_3.3a-4woody1.diff.gz stable/contrib/binary-i386/libapache-mod-jk_3.3a-4woody1_i386.deb stable/contrib/source/tomcat_3.3a-4woody1.dsc stable/contrib/binary-all/tomcat_3.3a-4woody1_all.deb tomcat (3.3a-4woody1) unstable; urgency=high * Include two security fixes from the Tomcat 3.3.1a release: + when used with JDK 1.3.1 or earlier, a maliciously crafted request could return a directory listing even when an index.html, index.jsp, or other welcome file is present. File contents can be returned as well. + a malicious web application could read the contents of some files outside the web application via its web.xml file in spite of the presence of a security manager * Disable the examples webapp since it contains cross site scripting vulnerability: examples.war is now installed in /usr/share/doc/tomcat/examples stable/main/binary-s390/thttpd-util_2.21b-11.2_s390.deb stable/main/binary-s390/thttpd_2.21b-11.2_s390.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-powerpc/thttpd-util_2.21b-11.2_powerpc.deb stable/main/binary-powerpc/thttpd_2.21b-11.2_powerpc.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-mipsel/thttpd_2.21b-11.2_mipsel.deb stable/main/binary-mipsel/thttpd-util_2.21b-11.2_mipsel.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-mips/thttpd-util_2.21b-11.2_mips.deb stable/main/binary-mips/thttpd_2.21b-11.2_mips.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-m68k/thttpd_2.21b-11.2_m68k.deb stable/main/binary-m68k/thttpd-util_2.21b-11.2_m68k.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-ia64/thttpd-util_2.21b-11.2_ia64.deb stable/main/binary-ia64/thttpd_2.21b-11.2_ia64.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-i386/thttpd_2.21b-11.2_i386.deb stable/main/binary-i386/thttpd-util_2.21b-11.2_i386.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-hppa/thttpd-util_2.21b-11.2_hppa.deb stable/main/binary-hppa/thttpd_2.21b-11.2_hppa.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-arm/thttpd-util_2.21b-11.2_arm.deb stable/main/binary-arm/thttpd_2.21b-11.2_arm.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-alpha/thttpd-util_2.21b-11.2_alpha.deb stable/main/binary-alpha/thttpd_2.21b-11.2_alpha.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-sparc/thttpd_2.21b-11.2_sparc.deb stable/main/source/thttpd_2.21b-11.2.diff.gz stable/main/source/thttpd_2.21b-11.2.dsc stable/main/binary-sparc/thttpd-util_2.21b-11.2_sparc.deb thttpd (2.21b-11.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Jef Poskanzer to fix a remote denial of service attack, and possible execution of arbitrary code (libhttpd.c, http://www.securityfocus.com/archive/1/342584, http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049) stable/main/binary-sparc/teapop_0.3.4-1woody2_sparc.deb stable/main/binary-sparc/teapop-mysql_0.3.4-1woody2_sparc.deb stable/main/binary-sparc/teapop-pgsql_0.3.4-1woody2_sparc.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-s390/teapop-pgsql_0.3.4-1woody2_s390.deb stable/main/binary-s390/teapop_0.3.4-1woody2_s390.deb stable/main/binary-s390/teapop-mysql_0.3.4-1woody2_s390.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-powerpc/teapop-pgsql_0.3.4-1woody2_powerpc.deb stable/main/binary-powerpc/teapop-mysql_0.3.4-1woody2_powerpc.deb stable/main/binary-powerpc/teapop_0.3.4-1woody2_powerpc.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-mipsel/teapop-pgsql_0.3.4-1woody2_mipsel.deb stable/main/binary-mipsel/teapop-mysql_0.3.4-1woody2_mipsel.deb stable/main/binary-mipsel/teapop_0.3.4-1woody2_mipsel.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-mips/teapop-mysql_0.3.4-1woody2_mips.deb stable/main/binary-mips/teapop_0.3.4-1woody2_mips.deb stable/main/binary-mips/teapop-pgsql_0.3.4-1woody2_mips.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-m68k/teapop-mysql_0.3.4-1woody2_m68k.deb stable/main/binary-m68k/teapop_0.3.4-1woody2_m68k.deb stable/main/binary-m68k/teapop-pgsql_0.3.4-1woody2_m68k.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-ia64/teapop-mysql_0.3.4-1woody2_ia64.deb stable/main/binary-ia64/teapop-pgsql_0.3.4-1woody2_ia64.deb stable/main/binary-ia64/teapop_0.3.4-1woody2_ia64.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-hppa/teapop_0.3.4-1woody2_hppa.deb stable/main/binary-hppa/teapop-pgsql_0.3.4-1woody2_hppa.deb stable/main/binary-hppa/teapop-mysql_0.3.4-1woody2_hppa.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-arm/teapop_0.3.4-1woody2_arm.deb stable/main/binary-arm/teapop-mysql_0.3.4-1woody2_arm.deb stable/main/binary-arm/teapop-pgsql_0.3.4-1woody2_arm.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-alpha/teapop-mysql_0.3.4-1woody2_alpha.deb stable/main/binary-alpha/teapop-pgsql_0.3.4-1woody2_alpha.deb stable/main/binary-alpha/teapop_0.3.4-1woody2_alpha.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/source/teapop_0.3.4-1woody2.dsc stable/main/binary-i386/teapop_0.3.4-1woody2_i386.deb stable/main/source/teapop_0.3.4-1woody2.diff.gz stable/main/binary-i386/teapop-mysql_0.3.4-1woody2_i386.deb stable/main/binary-i386/teapop-pgsql_0.3.4-1woody2_i386.deb teapop (0.3.4-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips and mipsel (how is it that there are mips and mipsel binaries in the archive?) stable/main/binary-sparc/tcptraceroute_1.2-2_sparc.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-s390/tcptraceroute_1.2-2_s390.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-powerpc/tcptraceroute_1.2-2_powerpc.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-mipsel/tcptraceroute_1.2-2_mipsel.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-mips/tcptraceroute_1.2-2_mips.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-m68k/tcptraceroute_1.2-2_m68k.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-ia64/tcptraceroute_1.2-2_ia64.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-hppa/tcptraceroute_1.2-2_hppa.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-arm/tcptraceroute_1.2-2_arm.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-alpha/tcptraceroute_1.2-2_alpha.deb tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/source/tcptraceroute_1.2-2.diff.gz stable/main/binary-i386/tcptraceroute_1.2-2_i386.deb stable/main/source/tcptraceroute_1.2-2.dsc tcptraceroute (1.2-2) stable-security; urgency=low * One-line security fix backported from tcptraceroute 1.4-4 (See Bug#198142: tcptraceroute: Does not drop root privileges properly) No other changes. stable/main/binary-s390/tcpdump_3.6.2-2.4_s390.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-powerpc/tcpdump_3.6.2-2.4_powerpc.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-mipsel/tcpdump_3.6.2-2.4_mipsel.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-mips/tcpdump_3.6.2-2.4_mips.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-m68k/tcpdump_3.6.2-2.4_m68k.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-ia64/tcpdump_3.6.2-2.4_ia64.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-i386/tcpdump_3.6.2-2.4_i386.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-hppa/tcpdump_3.6.2-2.4_hppa.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-arm/tcpdump_3.6.2-2.4_arm.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-alpha/tcpdump_3.6.2-2.4_alpha.deb tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/source/tcpdump_3.6.2-2.4.diff.gz stable/main/binary-sparc/tcpdump_3.6.2-2.4_sparc.deb stable/main/source/tcpdump_3.6.2-2.4.dsc tcpdump (3.6.2-2.4) stable-security; urgency=low * Non-maintainer upload by security team * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets (including some valid packets) stable/main/binary-sparc/sup_1.8-8woody1_sparc.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-s390/sup_1.8-8woody1_s390.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-powerpc/sup_1.8-8woody1_powerpc.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-mipsel/sup_1.8-8woody1_mipsel.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-mips/sup_1.8-8woody1_mips.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-m68k/sup_1.8-8woody1_m68k.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-ia64/sup_1.8-8woody1_ia64.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-hppa/sup_1.8-8woody1_hppa.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-arm/sup_1.8-8woody1_arm.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-alpha/sup_1.8-8woody1_alpha.deb sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/binary-i386/sup_1.8-8woody1_i386.deb stable/main/source/sup_1.8-8woody1.diff.gz stable/main/source/sup_1.8-8woody1.dsc sup (1.8-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jochen Friedrich to use O_EXCL when opening temporary files (CAN-2003-0606) stable/main/source/squirrelmail_1.2.6-1.3.dsc stable/main/binary-all/squirrelmail_1.2.6-1.3_all.deb stable/main/source/squirrelmail_1.2.6-1.3.diff.gz squirrelmail (1:1.2.6-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed cross site scripting problem in read_body.php (BugTraq ID 6302, CAN-2002-1341) stable/main/binary-sparc/spamassassin_2.20-1woody3_sparc.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-s390/spamassassin_2.20-1woody3_s390.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-powerpc/spamassassin_2.20-1woody3_powerpc.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-mipsel/spamassassin_2.20-1woody3_mipsel.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-mips/spamassassin_2.20-1woody3_mips.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-m68k/spamassassin_2.20-1woody3_m68k.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-ia64/spamassassin_2.20-1woody3_ia64.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-hppa/spamassassin_2.20-1woody3_hppa.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-arm/spamassassin_2.20-1woody3_arm.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-alpha/spamassassin_2.20-1woody3_alpha.deb spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-i386/spamassassin_2.20-1woody3_i386.deb stable/main/source/spamassassin_2.20-1woody3.diff.gz stable/main/source/spamassassin_2.20-1woody3.dsc spamassassin (2.20-1woody3) proposed-updates; urgency=low * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was not an RC. This version has the patch unrolled. stable/main/binary-sparc/snort-common_1.8.4beta1-3.1_sparc.deb stable/main/binary-sparc/snort_1.8.4beta1-3.1_sparc.deb stable/main/binary-sparc/snort-mysql_1.8.4beta1-3.1_sparc.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-s390/snort-common_1.8.4beta1-3.1_s390.deb stable/main/binary-s390/snort-mysql_1.8.4beta1-3.1_s390.deb stable/main/binary-s390/snort_1.8.4beta1-3.1_s390.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-powerpc/snort-common_1.8.4beta1-3.1_powerpc.deb stable/main/binary-powerpc/snort_1.8.4beta1-3.1_powerpc.deb stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3.1_powerpc.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3.1_mipsel.deb stable/main/binary-mipsel/snort_1.8.4beta1-3.1_mipsel.deb stable/main/binary-mipsel/snort-common_1.8.4beta1-3.1_mipsel.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-mips/snort-common_1.8.4beta1-3.1_mips.deb stable/main/binary-mips/snort-mysql_1.8.4beta1-3.1_mips.deb stable/main/binary-mips/snort_1.8.4beta1-3.1_mips.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-m68k/snort_1.8.4beta1-3.1_m68k.deb stable/main/binary-m68k/snort-mysql_1.8.4beta1-3.1_m68k.deb stable/main/binary-m68k/snort-common_1.8.4beta1-3.1_m68k.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-ia64/snort-mysql_1.8.4beta1-3.1_ia64.deb stable/main/binary-ia64/snort-common_1.8.4beta1-3.1_ia64.deb stable/main/binary-ia64/snort_1.8.4beta1-3.1_ia64.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-i386/snort_1.8.4beta1-3.1_i386.deb stable/main/binary-i386/snort-common_1.8.4beta1-3.1_i386.deb stable/main/binary-i386/snort-mysql_1.8.4beta1-3.1_i386.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-hppa/snort-common_1.8.4beta1-3.1_hppa.deb stable/main/binary-hppa/snort_1.8.4beta1-3.1_hppa.deb stable/main/binary-hppa/snort-mysql_1.8.4beta1-3.1_hppa.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-arm/snort-common_1.8.4beta1-3.1_arm.deb stable/main/binary-arm/snort-mysql_1.8.4beta1-3.1_arm.deb stable/main/binary-arm/snort_1.8.4beta1-3.1_arm.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/source/snort_1.8.4beta1-3.1.diff.gz stable/main/source/snort_1.8.4beta1-3.1.dsc stable/main/binary-alpha/snort-common_1.8.4beta1-3.1_alpha.deb stable/main/binary-all/snort-doc_1.8.4beta1-3.1_all.deb stable/main/binary-all/snort-rules-default_1.8.4beta1-3.1_all.deb stable/main/binary-alpha/snort-mysql_1.8.4beta1-3.1_alpha.deb stable/main/binary-alpha/snort_1.8.4beta1-3.1_alpha.deb snort (1.8.4beta1-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream fix against integer overflow in the stream4 preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178, spp_stream4.c) * Applied upstream fix against buffer overflow in the RPC preprocessor (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c) stable/main/binary-s390/libsnmpkit2_0.9-4.woody.2_s390.deb stable/main/binary-s390/libsnmpkit-dev_0.9-4.woody.2_s390.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-powerpc/libsnmpkit2_0.9-4.woody.2_powerpc.deb stable/main/binary-powerpc/libsnmpkit-dev_0.9-4.woody.2_powerpc.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mipsel/libsnmpkit-dev_0.9-4.woody.2_mipsel.deb stable/main/binary-mipsel/libsnmpkit2_0.9-4.woody.2_mipsel.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mips/libsnmpkit2_0.9-4.woody.2_mips.deb stable/main/binary-mips/libsnmpkit-dev_0.9-4.woody.2_mips.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-m68k/libsnmpkit-dev_0.9-4.woody.2_m68k.deb stable/main/binary-m68k/libsnmpkit2_0.9-4.woody.2_m68k.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-ia64/libsnmpkit-dev_0.9-4.woody.2_ia64.deb stable/main/binary-ia64/libsnmpkit2_0.9-4.woody.2_ia64.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-i386/libsnmpkit-dev_0.9-4.woody.2_i386.deb stable/main/binary-i386/libsnmpkit2_0.9-4.woody.2_i386.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-hppa/libsnmpkit2_0.9-4.woody.2_hppa.deb stable/main/binary-hppa/libsnmpkit-dev_0.9-4.woody.2_hppa.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-arm/libsnmpkit-dev_0.9-4.woody.2_arm.deb stable/main/binary-arm/libsnmpkit2_0.9-4.woody.2_arm.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-alpha/libsnmpkit-dev_0.9-4.woody.2_alpha.deb stable/main/binary-alpha/libsnmpkit2_0.9-4.woody.2_alpha.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/source/snmpkit_0.9-4.woody.2.diff.gz stable/main/binary-sparc/libsnmpkit2_0.9-4.woody.2_sparc.deb stable/main/source/snmpkit_0.9-4.woody.2.dsc stable/main/binary-sparc/libsnmpkit-dev_0.9-4.woody.2_sparc.deb snmpkit (0.9-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-all/smb2www_980804-16.1_all.deb stable/main/source/smb2www_980804-16.1.dsc stable/main/source/smb2www_980804-16.1.diff.gz smb2www (980804-16.1) stable-security; urgency=high * Non-maintainer upload by the Security Team, authored by current maintainer + wrote the GetCmbOutput() function to fork new process and execute commands without using shell. + decode input query only in one place (in decode_query()). * Thanks to Robert Luberda stable/main/binary-s390/slocate_2.6-1.3.1_s390.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-powerpc/slocate_2.6-1.3.1_powerpc.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-mipsel/slocate_2.6-1.3.1_mipsel.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-mips/slocate_2.6-1.3.1_mips.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-m68k/slocate_2.6-1.3.1_m68k.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-ia64/slocate_2.6-1.3.1_ia64.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-i386/slocate_2.6-1.3.1_i386.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-hppa/slocate_2.6-1.3.1_hppa.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-arm/slocate_2.6-1.3.1_arm.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-alpha/slocate_2.6-1.3.1_alpha.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/source/slocate_2.6-1.3.1.dsc stable/main/source/slocate_2.6-1.3.1.diff.gz stable/main/binary-sparc/slocate_2.6-1.3.1_sparc.deb slocate (2.6-1.3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in argument handling, thanks to Kevin Lindsay (see CAN-2003-0056) stable/main/binary-sparc/slashem_0.0.6E4F8-4.0woody3_sparc.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-s390/slashem_0.0.6E4F8-4.0woody3_s390.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-powerpc/slashem_0.0.6E4F8-4.0woody3_powerpc.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-mipsel/slashem_0.0.6E4F8-4.0woody3_mipsel.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-mips/slashem_0.0.6E4F8-4.0woody3_mips.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-m68k/slashem_0.0.6E4F8-4.0woody3_m68k.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-ia64/slashem_0.0.6E4F8-4.0woody3_ia64.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-hppa/slashem_0.0.6E4F8-4.0woody3_hppa.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-arm/slashem_0.0.6E4F8-4.0woody3_arm.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-alpha/slashem_0.0.6E4F8-4.0woody3_alpha.deb slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-i386/slashem_0.0.6E4F8-4.0woody3_i386.deb stable/main/source/slashem_0.0.6E4F8-4.0woody3.dsc stable/main/source/slashem_0.0.6E4F8-4.0woody3.diff.gz slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target Peter Makholm's upload to proposed-updates to stable-security - Fix buffer overflow when displaying high scores [topten.c] stable/main/binary-sparc/skkserv_10.62a-4woody1_sparc.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-s390/skkserv_10.62a-4woody1_s390.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-powerpc/skkserv_10.62a-4woody1_powerpc.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-mipsel/skkserv_10.62a-4woody1_mipsel.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-mips/skkserv_10.62a-4woody1_mips.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-m68k/skkserv_10.62a-4woody1_m68k.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-ia64/skkserv_10.62a-4woody1_ia64.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-hppa/skkserv_10.62a-4woody1_hppa.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-arm/skkserv_10.62a-4woody1_arm.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-alpha/skkserv_10.62a-4woody1_alpha.deb skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/skk_10.62a-4woody1_all.deb stable/main/source/skk_10.62a-4woody1.dsc stable/main/binary-i386/skkserv_10.62a-4woody1_i386.deb stable/main/source/skk_10.62a-4woody1.diff.gz skk (10.62a-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/shorewall_1.2.12-2_all.deb stable/main/source/shorewall_1.2.12-2.diff.gz stable/main/source/shorewall_1.2.12-2.dsc stable/main/binary-all/shorewall-doc_1.2.12-2_all.deb shorewall (1.2.12-2) stable; urgency=low * apply fix for shorewall not applying rate limiting, as defined in 'shorewall.conf' as 'LOGRATE' and 'LOGBURST', to the rfc1918 logging as it does with all other logging. This has denial of service potential on noisy networks. (closes: #206764) * dh_installinit is not used anymore to install the init script, it is installed by hand to avoid automatically startup and shutdown of the firewall during upgrade, install and remove. This should prevent network blackouts (closes: #165477) * the SUBSYSLOCK variable of shorewall.conf is set to "" because the initscript doesn't need it at all (closes: #209023) stable/main/binary-sparc/sendmail-wide_8.12.3+3.5Wbeta-5.5_sparc.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-s390/sendmail-wide_8.12.3+3.5Wbeta-5.5_s390.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-powerpc/sendmail-wide_8.12.3+3.5Wbeta-5.5_powerpc.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-mipsel/sendmail-wide_8.12.3+3.5Wbeta-5.5_mipsel.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-mips/sendmail-wide_8.12.3+3.5Wbeta-5.5_mips.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-m68k/sendmail-wide_8.12.3+3.5Wbeta-5.5_m68k.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-ia64/sendmail-wide_8.12.3+3.5Wbeta-5.5_ia64.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-hppa/sendmail-wide_8.12.3+3.5Wbeta-5.5_hppa.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-arm/sendmail-wide_8.12.3+3.5Wbeta-5.5_arm.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-alpha/sendmail-wide_8.12.3+3.5Wbeta-5.5_alpha.deb sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.dsc stable/main/binary-i386/sendmail-wide_8.12.3+3.5Wbeta-5.5_i386.deb stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.diff.gz sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from sendmail 8.12.10 [CAN-2003-0681.patch, CAN-2003-0694.patch] stable/main/binary-sparc/libmilter-dev_8.12.3-6.6_sparc.deb stable/main/binary-sparc/sendmail_8.12.3-6.6_sparc.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-s390/sendmail_8.12.3-6.6_s390.deb stable/main/binary-s390/libmilter-dev_8.12.3-6.6_s390.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-powerpc/libmilter-dev_8.12.3-6.6_powerpc.deb stable/main/binary-powerpc/sendmail_8.12.3-6.6_powerpc.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-mipsel/sendmail_8.12.3-6.6_mipsel.deb stable/main/binary-mipsel/libmilter-dev_8.12.3-6.6_mipsel.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-mips/sendmail_8.12.3-6.6_mips.deb stable/main/binary-mips/libmilter-dev_8.12.3-6.6_mips.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-m68k/libmilter-dev_8.12.3-6.6_m68k.deb stable/main/binary-m68k/sendmail_8.12.3-6.6_m68k.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-ia64/sendmail_8.12.3-6.6_ia64.deb stable/main/binary-ia64/libmilter-dev_8.12.3-6.6_ia64.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-hppa/sendmail_8.12.3-6.6_hppa.deb stable/main/binary-hppa/libmilter-dev_8.12.3-6.6_hppa.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-arm/sendmail_8.12.3-6.6_arm.deb stable/main/binary-arm/libmilter-dev_8.12.3-6.6_arm.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-alpha/sendmail_8.12.3-6.6_alpha.deb stable/main/binary-alpha/libmilter-dev_8.12.3-6.6_alpha.deb sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-all/sendmail-doc_8.12.3-6.6_all.deb stable/main/binary-i386/sendmail_8.12.3-6.6_i386.deb stable/main/binary-i386/libmilter-dev_8.12.3-6.6_i386.deb stable/main/source/sendmail_8.12.3-6.6.dsc stable/main/source/sendmail_8.12.3-6.6.diff.gz sendmail (8.12.3-6.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerability in ruleset parsing [debian/patches/8.12/8.12.3/CAN-2003-0681.patch] stable/main/binary-all/semi_1.14.3.cvs.2001.08.10-1woody2_all.deb stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.dsc stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.diff.gz semi (1.14.3.cvs.2001.08.10-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Note CVE assignment in changelog (CAN-2003-0440) * No changes stable/main/binary-sparc/libsane_1.0.7-4_sparc.deb stable/main/binary-sparc/libsane-dev_1.0.7-4_sparc.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-s390/libsane_1.0.7-4_s390.deb stable/main/binary-s390/libsane-dev_1.0.7-4_s390.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-powerpc/libsane_1.0.7-4_powerpc.deb stable/main/binary-powerpc/libsane-dev_1.0.7-4_powerpc.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-mipsel/libsane_1.0.7-4_mipsel.deb stable/main/binary-mipsel/libsane-dev_1.0.7-4_mipsel.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-mips/libsane_1.0.7-4_mips.deb stable/main/binary-mips/libsane-dev_1.0.7-4_mips.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-m68k/libsane-dev_1.0.7-4_m68k.deb stable/main/binary-m68k/libsane_1.0.7-4_m68k.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-ia64/libsane_1.0.7-4_ia64.deb stable/main/binary-ia64/libsane-dev_1.0.7-4_ia64.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-hppa/libsane_1.0.7-4_hppa.deb stable/main/binary-hppa/libsane-dev_1.0.7-4_hppa.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-arm/libsane-dev_1.0.7-4_arm.deb stable/main/binary-arm/libsane_1.0.7-4_arm.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-alpha/libsane-dev_1.0.7-4_alpha.deb stable/main/binary-alpha/libsane_1.0.7-4_alpha.deb sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-i386/libsane-dev_1.0.7-4_i386.deb stable/main/source/sane-backends_1.0.7-4.dsc stable/main/binary-i386/libsane_1.0.7-4_i386.deb stable/main/source/sane-backends_1.0.7-4.diff.gz sane-backends (1.0.7-4) stable-security; urgency=high * Fixed a possible remotely exploitable bug. stable/main/binary-s390/swat_2.2.3a-12.3_s390.deb stable/main/binary-s390/smbclient_2.2.3a-12.3_s390.deb stable/main/binary-s390/libpam-smbpass_2.2.3a-12.3_s390.deb stable/main/binary-s390/libsmbclient-dev_2.2.3a-12.3_s390.deb stable/main/binary-s390/samba-common_2.2.3a-12.3_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-12.3_s390.deb stable/main/binary-s390/samba_2.2.3a-12.3_s390.deb stable/main/binary-s390/smbfs_2.2.3a-12.3_s390.deb stable/main/binary-s390/winbind_2.2.3a-12.3_s390.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/samba_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/winbind_2.2.3a-12.3_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-12.3_powerpc.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/smbclient_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/smbfs_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/samba-common_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-12.3_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-12.3_mipsel.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-mips/swat_2.2.3a-12.3_mips.deb stable/main/binary-mips/winbind_2.2.3a-12.3_mips.deb stable/main/binary-mips/samba_2.2.3a-12.3_mips.deb stable/main/binary-mips/smbclient_2.2.3a-12.3_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-12.3_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-12.3_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-12.3_mips.deb stable/main/binary-mips/smbfs_2.2.3a-12.3_mips.deb stable/main/binary-mips/samba-common_2.2.3a-12.3_mips.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-m68k/samba-common_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/samba_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/winbind_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/swat_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-12.3_m68k.deb stable/main/binary-m68k/smbfs_2.2.3a-12.3_m68k.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-ia64/swat_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/samba_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/smbclient_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/libsmbclient_2.2.3a-12.3_ia64.deb stable/main/binary-ia64/smbfs_2.2.3a-12.3_ia64.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-i386/libpam-smbpass_2.2.3a-12.3_i386.deb stable/main/binary-i386/libsmbclient-dev_2.2.3a-12.3_i386.deb stable/main/binary-i386/smbfs_2.2.3a-12.3_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-12.3_i386.deb stable/main/binary-i386/smbclient_2.2.3a-12.3_i386.deb stable/main/binary-i386/samba-common_2.2.3a-12.3_i386.deb stable/main/binary-i386/samba_2.2.3a-12.3_i386.deb stable/main/binary-i386/winbind_2.2.3a-12.3_i386.deb stable/main/binary-i386/swat_2.2.3a-12.3_i386.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-hppa/samba_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/swat_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/libsmbclient_2.2.3a-12.3_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-12.3_hppa.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-arm/samba_2.2.3a-12.3_arm.deb stable/main/binary-arm/winbind_2.2.3a-12.3_arm.deb stable/main/binary-arm/smbfs_2.2.3a-12.3_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-12.3_arm.deb stable/main/binary-arm/smbclient_2.2.3a-12.3_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-12.3_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-12.3_arm.deb stable/main/binary-arm/swat_2.2.3a-12.3_arm.deb stable/main/binary-arm/samba-common_2.2.3a-12.3_arm.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-alpha/swat_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/samba_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/smbclient_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/libpam-smbpass_2.2.3a-12.3_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-12.3_alpha.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-sparc/libpam-smbpass_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-12.3_sparc.deb stable/main/source/samba_2.2.3a-12.3.dsc stable/main/binary-sparc/samba_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/swat_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-12.3_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12.3_sparc.deb stable/main/source/samba_2.2.3a-12.3.diff.gz stable/main/binary-sparc/samba-common_2.2.3a-12.3_sparc.deb stable/main/binary-all/samba-doc_2.2.3a-12.3_all.deb samba (2.2.3a-12.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted patch to most recent bits from the Samba team stable/main/binary-sparc/radiusd-cistron_1.6.6-1woody1_sparc.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-s390/radiusd-cistron_1.6.6-1woody1_s390.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-powerpc/radiusd-cistron_1.6.6-1woody1_powerpc.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-mipsel/radiusd-cistron_1.6.6-1woody1_mipsel.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-mips/radiusd-cistron_1.6.6-1woody1_mips.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-m68k/radiusd-cistron_1.6.6-1woody1_m68k.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-ia64/radiusd-cistron_1.6.6-1woody1_ia64.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-hppa/radiusd-cistron_1.6.6-1woody1_hppa.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-arm/radiusd-cistron_1.6.6-1woody1_arm.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-alpha/radiusd-cistron_1.6.6-1woody1_alpha.deb radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/source/radiusd-cistron_1.6.6-1woody1.diff.gz stable/main/binary-i386/radiusd-cistron_1.6.6-1woody1_i386.deb stable/main/source/radiusd-cistron_1.6.6-1woody1.dsc radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow involving NAS-Port number (#196063) stable/main/binary-sparc/libproc-dev_2.0.7-8.woody1_sparc.deb stable/main/binary-sparc/procps_2.0.7-8.woody1_sparc.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-s390/libproc-dev_2.0.7-8.woody1_s390.deb stable/main/binary-s390/procps_2.0.7-8.woody1_s390.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-powerpc/libproc-dev_2.0.7-8.woody1_powerpc.deb stable/main/binary-powerpc/procps_2.0.7-8.woody1_powerpc.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-mipsel/procps_2.0.7-8.woody1_mipsel.deb stable/main/binary-mipsel/libproc-dev_2.0.7-8.woody1_mipsel.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-mips/libproc-dev_2.0.7-8.woody1_mips.deb stable/main/binary-mips/procps_2.0.7-8.woody1_mips.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-m68k/procps_2.0.7-8.woody1_m68k.deb stable/main/binary-m68k/libproc-dev_2.0.7-8.woody1_m68k.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-ia64/procps_2.0.7-8.woody1_ia64.deb stable/main/binary-ia64/libproc-dev_2.0.7-8.woody1_ia64.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-hppa/libproc-dev_2.0.7-8.woody1_hppa.deb stable/main/binary-hppa/procps_2.0.7-8.woody1_hppa.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-arm/procps_2.0.7-8.woody1_arm.deb stable/main/binary-arm/libproc-dev_2.0.7-8.woody1_arm.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-alpha/procps_2.0.7-8.woody1_alpha.deb stable/main/binary-alpha/libproc-dev_2.0.7-8.woody1_alpha.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/source/procps_2.0.7-8.woody1.dsc stable/main/source/procps_2.0.7-8.woody1.diff.gz stable/main/binary-i386/procps_2.0.7-8.woody1_i386.deb stable/main/binary-i386/libproc-dev_2.0.7-8.woody1_i386.deb procps (1:2.0.7-8.woody1) stable; urgency=low * Fixes ps crash when system.map is exact multiple of 1024 Exact same patch as for 2.0.7-10 By happy coincidence Debian ships some kernels that have a System.map file that is modulo 1024. Thankyou Colin for the patch (again) Closes: #205288, #203982 stable/main/binary-sparc/procmail_3.22-5_sparc.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-s390/procmail_3.22-5_s390.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-powerpc/procmail_3.22-5_powerpc.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-mipsel/procmail_3.22-5_mipsel.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-mips/procmail_3.22-5_mips.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-m68k/procmail_3.22-5_m68k.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-ia64/procmail_3.22-5_ia64.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-hppa/procmail_3.22-5_hppa.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-arm/procmail_3.22-5_arm.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-alpha/procmail_3.22-5_alpha.deb procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/source/procmail_3.22-5.dsc stable/main/binary-i386/procmail_3.22-5_i386.deb stable/main/source/procmail_3.22-5.diff.gz procmail (3.22-5) stable; urgency=medium * Patched pipes.c to fix a memory allocation bug (Closes: #171514). stable/main/binary-s390/pptpd_1.1.2-1.4_s390.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-powerpc/pptpd_1.1.2-1.4_powerpc.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-mipsel/pptpd_1.1.2-1.4_mipsel.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-mips/pptpd_1.1.2-1.4_mips.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-m68k/pptpd_1.1.2-1.4_m68k.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-ia64/pptpd_1.1.2-1.4_ia64.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-i386/pptpd_1.1.2-1.4_i386.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-hppa/pptpd_1.1.2-1.4_hppa.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-arm/pptpd_1.1.2-1.4_arm.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-alpha/pptpd_1.1.2-1.4_alpha.deb pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-sparc/pptpd_1.1.2-1.4_sparc.deb stable/main/source/pptpd_1.1.2-1.4.dsc stable/main/source/pptpd_1.1.2-1.4.diff.gz pptpd (1.1.2-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363) stable/main/binary-sparc/postgresql-client_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql-dev_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgtcl_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libecpg3_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgperl_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/python-pygresql_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/libpgsql2_7.2.1-2woody4_sparc.deb stable/main/binary-sparc/pgaccess_7.2.1-2woody4_sparc.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-s390/postgresql-contrib_7.2.1-2woody4_s390.deb stable/main/binary-s390/libecpg3_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql-dev_7.2.1-2woody4_s390.deb stable/main/binary-s390/odbc-postgresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/python-pygresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql-client_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgtcl_7.2.1-2woody4_s390.deb stable/main/binary-s390/postgresql_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgsql2_7.2.1-2woody4_s390.deb stable/main/binary-s390/pgaccess_7.2.1-2woody4_s390.deb stable/main/binary-s390/libpgperl_7.2.1-2woody4_s390.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-powerpc/python-pygresql_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgsql2_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/pgaccess_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libecpg3_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/libpgperl_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody4_powerpc.deb stable/main/binary-powerpc/postgresql_7.2.1-2woody4_powerpc.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-mipsel/pgaccess_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgsql2_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libecpg3_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgperl_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody4_mipsel.deb stable/main/binary-mipsel/python-pygresql_7.2.1-2woody4_mipsel.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-mips/postgresql_7.2.1-2woody4_mips.deb stable/main/binary-mips/libecpg3_7.2.1-2woody4_mips.deb stable/main/binary-mips/pgaccess_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-dev_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgtcl_7.2.1-2woody4_mips.deb stable/main/binary-mips/odbc-postgresql_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgsql2_7.2.1-2woody4_mips.deb stable/main/binary-mips/libpgperl_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-contrib_7.2.1-2woody4_mips.deb stable/main/binary-mips/postgresql-client_7.2.1-2woody4_mips.deb stable/main/binary-mips/python-pygresql_7.2.1-2woody4_mips.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-m68k/postgresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-dev_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/pgaccess_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-client_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/python-pygresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgperl_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgsql2_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libecpg3_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody4_m68k.deb stable/main/binary-m68k/libpgtcl_7.2.1-2woody4_m68k.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-ia64/postgresql-dev_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libecpg3_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgperl_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/python-pygresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/pgaccess_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgtcl_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/libpgsql2_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody4_ia64.deb stable/main/binary-ia64/postgresql-client_7.2.1-2woody4_ia64.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-hppa/postgresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-dev_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-client_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgperl_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/python-pygresql_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgsql2_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/pgaccess_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libpgtcl_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody4_hppa.deb stable/main/binary-hppa/libecpg3_7.2.1-2woody4_hppa.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-arm/pgaccess_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-client_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-dev_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgsql2_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgtcl_7.2.1-2woody4_arm.deb stable/main/binary-arm/libecpg3_7.2.1-2woody4_arm.deb stable/main/binary-arm/postgresql-contrib_7.2.1-2woody4_arm.deb stable/main/binary-arm/python-pygresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/odbc-postgresql_7.2.1-2woody4_arm.deb stable/main/binary-arm/libpgperl_7.2.1-2woody4_arm.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-alpha/pgaccess_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/python-pygresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-dev_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-client_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgsql2_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgtcl_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libpgperl_7.2.1-2woody4_alpha.deb stable/main/binary-alpha/libecpg3_7.2.1-2woody4_alpha.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-i386/pgaccess_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgperl_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql-contrib_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgsql2_7.2.1-2woody4_i386.deb stable/main/binary-i386/python-pygresql_7.2.1-2woody4_i386.deb stable/main/source/postgresql_7.2.1-2woody4.dsc stable/main/binary-i386/odbc-postgresql_7.2.1-2woody4_i386.deb stable/main/binary-i386/libpgtcl_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql-dev_7.2.1-2woody4_i386.deb stable/main/source/postgresql_7.2.1-2woody4.diff.gz stable/main/binary-all/postgresql-doc_7.2.1-2woody4_all.deb stable/main/binary-i386/postgresql-client_7.2.1-2woody4_i386.deb stable/main/binary-i386/libecpg3_7.2.1-2woody4_i386.deb stable/main/binary-i386/postgresql_7.2.1-2woody4_i386.deb postgresql (7.2.1-2woody4) stable-security; urgency=low * Updated config/config.{guess,sub} to the recent woody version (building on mips fails with the old ones) stable/main/binary-sparc/postfix-mysql_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix-pcre_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix-ldap_1.1.11-0.woody3_sparc.deb stable/main/binary-sparc/postfix_1.1.11-0.woody3_sparc.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-s390/postfix-pcre_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix-mysql_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix_1.1.11-0.woody3_s390.deb stable/main/binary-s390/postfix-ldap_1.1.11-0.woody3_s390.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-powerpc/postfix-ldap_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix-mysql_1.1.11-0.woody3_powerpc.deb stable/main/binary-powerpc/postfix-pcre_1.1.11-0.woody3_powerpc.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-mipsel/postfix_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-ldap_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-pcre_1.1.11-0.woody3_mipsel.deb stable/main/binary-mipsel/postfix-mysql_1.1.11-0.woody3_mipsel.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-mips/postfix_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-ldap_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-pcre_1.1.11-0.woody3_mips.deb stable/main/binary-mips/postfix-mysql_1.1.11-0.woody3_mips.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-m68k/postfix-ldap_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix-mysql_1.1.11-0.woody3_m68k.deb stable/main/binary-m68k/postfix-pcre_1.1.11-0.woody3_m68k.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-ia64/postfix-mysql_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix-ldap_1.1.11-0.woody3_ia64.deb stable/main/binary-ia64/postfix-pcre_1.1.11-0.woody3_ia64.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-hppa/postfix_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-mysql_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-pcre_1.1.11-0.woody3_hppa.deb stable/main/binary-hppa/postfix-ldap_1.1.11-0.woody3_hppa.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-arm/postfix_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-mysql_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-pcre_1.1.11-0.woody3_arm.deb stable/main/binary-arm/postfix-ldap_1.1.11-0.woody3_arm.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-alpha/postfix-mysql_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix-pcre_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix_1.1.11-0.woody3_alpha.deb stable/main/binary-alpha/postfix-ldap_1.1.11-0.woody3_alpha.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-i386/postfix-pcre_1.1.11-0.woody3_i386.deb stable/main/binary-i386/postfix-mysql_1.1.11-0.woody3_i386.deb stable/main/binary-i386/postfix-ldap_1.1.11-0.woody3_i386.deb stable/main/source/postfix_1.1.11-0.woody3.dsc stable/main/source/postfix_1.1.11-0.woody3.diff.gz stable/main/binary-all/postfix-dev_1.1.11-0.woody3_all.deb stable/main/binary-i386/postfix_1.1.11-0.woody3_i386.deb stable/main/binary-all/postfix-doc_1.1.11-0.woody3_all.deb postfix (1.1.11-0.woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Security fixes from postfix 1.1.12 and 1.1.13 - bounce scanning (CAN-2003-0468) [src/trivial-rewrite/resolve.c] - malformed address DoS (CAN-2003-0540) [src/global/resolve_clnt.c, src/global/resolve_clnt.h, src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in, src/trivial-rewrite/resolve.c] stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody2_all.deb stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody2_all.deb stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.dsc stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.diff.gz stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody2_all.deb phpgroupware (0.9.14-0.RC3.2.woody2) stable-security; urgency=high * Security fixes - Cross site scripting (CAN-2003-0504), see - sql insertion (CAN-2003-0657) - vfs storage in document dir now prohibited (CAN-2003-0599) - Remove $appdir in includes in tables_update.inc.php to prevent execution of arbitrary scripts. (These are the backports of the security fixes done upstream between version 0.9.14.003 and 0.9.14.006, see phpgroupware.org.) Closes: #201980. * Also: prohibit vfs storage in document dir in the old vfs class of filemanager product. stable/main/binary-sparc/php4-imap_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-gd_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mysql_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-6woody3_sparc.deb stable/main/binary-sparc/php4_4.1.2-6woody3_sparc.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-s390/php4-mcal_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-mhash_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-gd_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-6woody3_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-curl_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-recode_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-imap_4.1.2-6woody3_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-6woody3_s390.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-powerpc/php4-xslt_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-gd_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-6woody3_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.1.2-6woody3_powerpc.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-mipsel/php4-gd_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-6woody3_mipsel.deb stable/main/binary-mipsel/php4-recode_4.1.2-6woody3_mipsel.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-mips/php4-cgi_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mhash_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-sybase_4.1.2-6woody3_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-gd_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-imap_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-curl_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-domxml_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-recode_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4_4.1.2-6woody3_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-6woody3_mips.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-m68k/php4-curl_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/caudium-php4_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-sybase_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4_4.1.2-6woody3_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-6woody3_m68k.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-ia64/php4-odbc_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-snmp_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-gd_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-xslt_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-6woody3_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-6woody3_ia64.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-hppa/php4_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mcal_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-cgi_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-odbc_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-gd_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mysql_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-sybase_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-6woody3_hppa.deb stable/main/binary-hppa/php4-imap_4.1.2-6woody3_hppa.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-arm/php4-mhash_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-recode_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-imap_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-6woody3_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-curl_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-odbc_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-gd_4.1.2-6woody3_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-6woody3_arm.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-alpha/php4-mcal_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-ldap_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-mhash_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4-imap_4.1.2-6woody3_alpha.deb stable/main/binary-alpha/php4_4.1.2-6woody3_alpha.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-i386/php4-mysql_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-recode_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-imap_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-snmp_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-cgi_4.1.2-6woody3_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-gd_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-xslt_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-6woody3_i386.deb stable/main/binary-all/php4-dev_4.1.2-6woody3_all.deb stable/main/binary-i386/php4-ldap_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-mcal_4.1.2-6woody3_i386.deb stable/main/source/php4_4.1.2-6woody3.diff.gz stable/main/binary-all/php4-pear_4.1.2-6woody3_all.deb stable/main/source/php4_4.1.2-6woody3.dsc stable/main/binary-i386/php4-curl_4.1.2-6woody3_i386.deb stable/main/binary-i386/php4-mhash_4.1.2-6woody3_i386.deb php4 (4:4.1.2-6woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Changelog correction only * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442. Disregard the CAN mentioned in that changelog entry. stable/main/binary-sparc/perl_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-suid_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-debug_5.6.1-8.3_sparc.deb stable/main/binary-sparc/perl-base_5.6.1-8.3_sparc.deb stable/main/binary-sparc/libperl-dev_5.6.1-8.3_sparc.deb stable/main/binary-sparc/libperl5.6_5.6.1-8.3_sparc.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-s390/perl_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-base_5.6.1-8.3_s390.deb stable/main/binary-s390/libperl-dev_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-suid_5.6.1-8.3_s390.deb stable/main/binary-s390/libperl5.6_5.6.1-8.3_s390.deb stable/main/binary-s390/perl-debug_5.6.1-8.3_s390.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-powerpc/perl-suid_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl-debug_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/libperl5.6_5.6.1-8.3_powerpc.deb stable/main/binary-powerpc/perl-base_5.6.1-8.3_powerpc.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-mipsel/perl-base_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl-debug_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/libperl5.6_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.6.1-8.3_mipsel.deb stable/main/binary-mipsel/perl-suid_5.6.1-8.3_mipsel.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-mips/perl-debug_5.6.1-8.3_mips.deb stable/main/binary-mips/libperl5.6_5.6.1-8.3_mips.deb stable/main/binary-mips/perl_5.6.1-8.3_mips.deb stable/main/binary-mips/perl-suid_5.6.1-8.3_mips.deb stable/main/binary-mips/libperl-dev_5.6.1-8.3_mips.deb stable/main/binary-mips/perl-base_5.6.1-8.3_mips.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-m68k/perl-debug_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl-suid_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl_5.6.1-8.3_m68k.deb stable/main/binary-m68k/libperl5.6_5.6.1-8.3_m68k.deb stable/main/binary-m68k/libperl-dev_5.6.1-8.3_m68k.deb stable/main/binary-m68k/perl-base_5.6.1-8.3_m68k.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-ia64/libperl5.6_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl_5.6.1-8.3_ia64.deb stable/main/binary-ia64/libperl-dev_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-base_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-suid_5.6.1-8.3_ia64.deb stable/main/binary-ia64/perl-debug_5.6.1-8.3_ia64.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-hppa/perl-suid_5.6.1-8.3_hppa.deb stable/main/binary-hppa/libperl-dev_5.6.1-8.3_hppa.deb stable/main/binary-hppa/libperl5.6_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl-base_5.6.1-8.3_hppa.deb stable/main/binary-hppa/perl-debug_5.6.1-8.3_hppa.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-arm/perl-debug_5.6.1-8.3_arm.deb stable/main/binary-arm/libperl5.6_5.6.1-8.3_arm.deb stable/main/binary-arm/perl-suid_5.6.1-8.3_arm.deb stable/main/binary-arm/perl_5.6.1-8.3_arm.deb stable/main/binary-arm/perl-base_5.6.1-8.3_arm.deb stable/main/binary-arm/libperl-dev_5.6.1-8.3_arm.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-alpha/perl_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-suid_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-base_5.6.1-8.3_alpha.deb stable/main/binary-alpha/libperl-dev_5.6.1-8.3_alpha.deb stable/main/binary-alpha/perl-debug_5.6.1-8.3_alpha.deb stable/main/binary-alpha/libperl5.6_5.6.1-8.3_alpha.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-i386/perl_5.6.1-8.3_i386.deb stable/main/source/perl_5.6.1-8.3.diff.gz stable/main/binary-all/libcgi-fast-perl_5.6.1-8.3_all.deb stable/main/binary-i386/perl-base_5.6.1-8.3_i386.deb stable/main/binary-all/perl-modules_5.6.1-8.3_all.deb stable/main/binary-i386/libperl-dev_5.6.1-8.3_i386.deb stable/main/binary-all/perl-doc_5.6.1-8.3_all.deb stable/main/binary-i386/libperl5.6_5.6.1-8.3_i386.deb stable/main/source/perl_5.6.1-8.3.dsc stable/main/binary-i386/perl-debug_5.6.1-8.3_i386.deb stable/main/binary-i386/perl-suid_5.6.1-8.3_i386.deb perl (5.6.1-8.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to fix cross-site scripting in CGI.pm (CAN-2003-0615) [debian/patches/19_fix_cgi_xss] stable/main/binary-powerpc/pcmcia-cs_3.1.33-6woody1_powerpc.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-arm/pcmcia-cs_3.1.33-6woody1_arm.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-alpha/pcmcia-cs_3.1.33-6woody1_alpha.deb pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/source/pcmcia-cs_3.1.33-6woody1.diff.gz stable/main/binary-i386/pcmcia-cs_3.1.33-6woody1_i386.deb stable/main/binary-all/pcmcia-source_3.1.33-6woody1_all.deb stable/main/source/pcmcia-cs_3.1.33-6woody1.dsc pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Need pcmcia-cs source in stable-security in order to provide updated pcmcia-modules for kernel update. * No changes stable/main/binary-sparc/orville-write_2.53-4woody1_sparc.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-s390/orville-write_2.53-4woody1_s390.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-powerpc/orville-write_2.53-4woody1_powerpc.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-mipsel/orville-write_2.53-4woody1_mipsel.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-mips/orville-write_2.53-4woody1_mips.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-m68k/orville-write_2.53-4woody1_m68k.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-ia64/orville-write_2.53-4woody1_ia64.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-hppa/orville-write_2.53-4woody1_hppa.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-arm/orville-write_2.53-4woody1_arm.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-alpha/orville-write_2.53-4woody1_alpha.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/source/orville-write_2.53-4woody1.dsc stable/main/source/orville-write_2.53-4woody1.diff.gz stable/main/binary-i386/orville-write_2.53-4woody1_i386.deb orville-write (2.53-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows when processing environment variables (CAN-2003-0441) stable/main/binary-sparc/ssh-krb5_3.4p1-0woody4_sparc.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/ssh-krb5_3.4p1-0woody4_s390.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-powerpc/ssh-krb5_3.4p1-0woody4_powerpc.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mipsel/ssh-krb5_3.4p1-0woody4_mipsel.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mips/ssh-krb5_3.4p1-0woody4_mips.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-m68k/ssh-krb5_3.4p1-0woody4_m68k.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-ia64/ssh-krb5_3.4p1-0woody4_ia64.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-hppa/ssh-krb5_3.4p1-0woody4_hppa.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-arm/ssh-krb5_3.4p1-0woody4_arm.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-alpha/ssh-krb5_3.4p1-0woody4_alpha.deb openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/source/openssh-krb5_3.4p1-0woody4.dsc stable/main/binary-i386/ssh-krb5_3.4p1-0woody4_i386.deb stable/main/source/openssh-krb5_3.4p1-0woody4.diff.gz openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-sparc/ssh_3.4p1-1.woody.3_sparc.deb stable/main/binary-sparc/ssh-askpass-gnome_3.4p1-1.woody.3_sparc.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/ssh_3.4p1-1.woody.3_s390.deb stable/main/binary-s390/ssh-askpass-gnome_3.4p1-1.woody.3_s390.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-powerpc/ssh_3.4p1-1.woody.3_powerpc.deb stable/main/binary-powerpc/ssh-askpass-gnome_3.4p1-1.woody.3_powerpc.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mipsel/ssh_3.4p1-1.woody.3_mipsel.deb stable/main/binary-mipsel/ssh-askpass-gnome_3.4p1-1.woody.3_mipsel.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-mips/ssh_3.4p1-1.woody.3_mips.deb stable/main/binary-mips/ssh-askpass-gnome_3.4p1-1.woody.3_mips.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-m68k/ssh-askpass-gnome_3.4p1-1.woody.3_m68k.deb stable/main/binary-m68k/ssh_3.4p1-1.woody.3_m68k.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-ia64/ssh_3.4p1-1.woody.3_ia64.deb stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1.woody.3_ia64.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-hppa/ssh_3.4p1-1.woody.3_hppa.deb stable/main/binary-hppa/ssh-askpass-gnome_3.4p1-1.woody.3_hppa.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-arm/ssh-askpass-gnome_3.4p1-1.woody.3_arm.deb stable/main/binary-arm/ssh_3.4p1-1.woody.3_arm.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-alpha/ssh-askpass-gnome_3.4p1-1.woody.3_alpha.deb stable/main/binary-alpha/ssh_3.4p1-1.woody.3_alpha.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-i386/ssh-askpass-gnome_3.4p1-1.woody.3_i386.deb stable/main/source/openssh_3.4p1-1.woody.3.diff.gz stable/main/source/openssh_3.4p1-1.woody.3.dsc stable/main/binary-i386/ssh_3.4p1-1.woody.3_i386.deb openssh (1:3.4p1-1.woody.3) stable-security; urgency=high * NMU by the security team. * Apply additional realloc fixes from Solar Designer * Apply double-free fix, taken from OpenBSD CVS stable/main/binary-s390/slapd_2.0.23-6.3_s390.deb stable/main/binary-s390/ldap-gateways_2.0.23-6.3_s390.deb stable/main/binary-s390/libldap2-dev_2.0.23-6.3_s390.deb stable/main/binary-s390/libldap2_2.0.23-6.3_s390.deb stable/main/binary-s390/ldap-utils_2.0.23-6.3_s390.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-powerpc/libldap2_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/libldap2-dev_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/ldap-utils_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/ldap-gateways_2.0.23-6.3_powerpc.deb stable/main/binary-powerpc/slapd_2.0.23-6.3_powerpc.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-mipsel/libldap2-dev_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/ldap-utils_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/ldap-gateways_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/slapd_2.0.23-6.3_mipsel.deb stable/main/binary-mipsel/libldap2_2.0.23-6.3_mipsel.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-mips/slapd_2.0.23-6.3_mips.deb stable/main/binary-mips/libldap2-dev_2.0.23-6.3_mips.deb stable/main/binary-mips/ldap-gateways_2.0.23-6.3_mips.deb stable/main/binary-mips/libldap2_2.0.23-6.3_mips.deb stable/main/binary-mips/ldap-utils_2.0.23-6.3_mips.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-m68k/slapd_2.0.23-6.3_m68k.deb stable/main/binary-m68k/ldap-utils_2.0.23-6.3_m68k.deb stable/main/binary-m68k/libldap2_2.0.23-6.3_m68k.deb stable/main/binary-m68k/ldap-gateways_2.0.23-6.3_m68k.deb stable/main/binary-m68k/libldap2-dev_2.0.23-6.3_m68k.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-ia64/libldap2-dev_2.0.23-6.3_ia64.deb stable/main/binary-ia64/libldap2_2.0.23-6.3_ia64.deb stable/main/binary-ia64/slapd_2.0.23-6.3_ia64.deb stable/main/binary-ia64/ldap-utils_2.0.23-6.3_ia64.deb stable/main/binary-ia64/ldap-gateways_2.0.23-6.3_ia64.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-i386/ldap-utils_2.0.23-6.3_i386.deb stable/main/binary-i386/ldap-gateways_2.0.23-6.3_i386.deb stable/main/binary-i386/libldap2-dev_2.0.23-6.3_i386.deb stable/main/binary-i386/slapd_2.0.23-6.3_i386.deb stable/main/binary-i386/libldap2_2.0.23-6.3_i386.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-hppa/slapd_2.0.23-6.3_hppa.deb stable/main/binary-hppa/libldap2_2.0.23-6.3_hppa.deb stable/main/binary-hppa/ldap-utils_2.0.23-6.3_hppa.deb stable/main/binary-hppa/libldap2-dev_2.0.23-6.3_hppa.deb stable/main/binary-hppa/ldap-gateways_2.0.23-6.3_hppa.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-arm/ldap-gateways_2.0.23-6.3_arm.deb stable/main/binary-arm/slapd_2.0.23-6.3_arm.deb stable/main/binary-arm/libldap2-dev_2.0.23-6.3_arm.deb stable/main/binary-arm/ldap-utils_2.0.23-6.3_arm.deb stable/main/binary-arm/libldap2_2.0.23-6.3_arm.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-alpha/libldap2_2.0.23-6.3_alpha.deb stable/main/binary-alpha/slapd_2.0.23-6.3_alpha.deb stable/main/binary-alpha/ldap-gateways_2.0.23-6.3_alpha.deb stable/main/binary-alpha/libldap2-dev_2.0.23-6.3_alpha.deb stable/main/binary-alpha/ldap-utils_2.0.23-6.3_alpha.deb openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-sparc/ldap-utils_2.0.23-6.3_sparc.deb stable/main/source/openldap2_2.0.23-6.3.diff.gz stable/main/binary-sparc/libldap2_2.0.23-6.3_sparc.deb stable/main/binary-sparc/ldap-gateways_2.0.23-6.3_sparc.deb stable/main/binary-sparc/slapd_2.0.23-6.3_sparc.deb stable/main/binary-sparc/libldap2-dev_2.0.23-6.3_sparc.deb stable/main/source/openldap2_2.0.23-6.3.dsc openldap2 (2.0.23-6.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Disabled check for Berkeley DB thread support and enabled support unconditionally since a it seems like that check is broken by an compiler error on HPPA. stable/main/binary-s390/omega-rpg_0.90-pa9-7woody1_s390.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-powerpc/omega-rpg_0.90-pa9-7woody1_powerpc.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-mipsel/omega-rpg_0.90-pa9-7woody1_mipsel.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-mips/omega-rpg_0.90-pa9-7woody1_mips.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-m68k/omega-rpg_0.90-pa9-7woody1_m68k.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-ia64/omega-rpg_0.90-pa9-7woody1_ia64.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-i386/omega-rpg_0.90-pa9-7woody1_i386.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-hppa/omega-rpg_0.90-pa9-7woody1_hppa.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-arm/omega-rpg_0.90-pa9-7woody1_arm.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-alpha/omega-rpg_0.90-pa9-7woody1_alpha.deb omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/source/omega-rpg_0.90-pa9-7woody1.diff.gz stable/main/binary-sparc/omega-rpg_0.90-pa9-7woody1_sparc.deb stable/main/source/omega-rpg_0.90-pa9-7woody1.dsc omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low * Non maintainer upload by The Security Team. * Fixed buffer overflow in command line argument handling. * Fixed buffer overflows in use of environmental variable usage. stable/main/binary-sparc/nowebm_2.9a-7.3_sparc.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-s390/nowebm_2.9a-7.3_s390.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-powerpc/nowebm_2.9a-7.3_powerpc.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-mipsel/nowebm_2.9a-7.3_mipsel.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-mips/nowebm_2.9a-7.3_mips.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-m68k/nowebm_2.9a-7.3_m68k.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-hppa/nowebm_2.9a-7.3_hppa.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-arm/nowebm_2.9a-7.3_arm.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-alpha/nowebm_2.9a-7.3_alpha.deb noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/source/noweb_2.9a-7.3.dsc stable/main/binary-i386/nowebm_2.9a-7.3_i386.deb stable/main/source/noweb_2.9a-7.3.diff.gz noweb (2.9a-7.3) stable-security; urgency=high * Try to fix build problems on ia64 and hppa using -ffunction-sections stable/main/binary-s390/node_0.3.0a-2woody1_s390.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-powerpc/node_0.3.0a-2woody1_powerpc.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-mipsel/node_0.3.0a-2woody1_mipsel.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-mips/node_0.3.0a-2woody1_mips.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-m68k/node_0.3.0a-2woody1_m68k.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-ia64/node_0.3.0a-2woody1_ia64.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-i386/node_0.3.0a-2woody1_i386.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-hppa/node_0.3.0a-2woody1_hppa.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-arm/node_0.3.0a-2woody1_arm.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-alpha/node_0.3.0a-2woody1_alpha.deb node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/source/node_0.3.0a-2woody1.diff.gz stable/main/binary-sparc/node_0.3.0a-2woody1_sparc.deb stable/main/source/node_0.3.0a-2woody1.dsc node (0.3.0a-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed buffer overflow in expand_string() (from upstream and SM6TKY) * Corrected use of syslog() to fix a potential format string vulnerability() (from upstream and SM6TKY) * Fixed another format string vulnerability (from upstream and SM6TKY) * Thanks to Tomi Manninen stable/main/binary-sparc/netris_0.5-4woody1_sparc.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-s390/netris_0.5-4woody1_s390.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-powerpc/netris_0.5-4woody1_powerpc.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-mipsel/netris_0.5-4woody1_mipsel.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-mips/netris_0.5-4woody1_mips.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-m68k/netris_0.5-4woody1_m68k.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-ia64/netris_0.5-4woody1_ia64.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-hppa/netris_0.5-4woody1_hppa.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-arm/netris_0.5-4woody1_arm.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-alpha/netris_0.5-4woody1_alpha.deb netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/source/netris_0.5-4woody1.diff.gz stable/main/binary-i386/netris_0.5-4woody1_i386.deb stable/main/source/netris_0.5-4woody1.dsc netris (0.5-4woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from "Mark H. Weaver" to fix buffer overflow in NetGenFunc (CAN-2003-0685) stable/main/binary-sparc/libnetpbm9-dev_9.20-8.2_sparc.deb stable/main/binary-sparc/libnetpbm9_9.20-8.2_sparc.deb stable/main/binary-sparc/netpbm_9.20-8.2_sparc.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-s390/libnetpbm9-dev_9.20-8.2_s390.deb stable/main/binary-s390/libnetpbm9_9.20-8.2_s390.deb stable/main/binary-s390/netpbm_9.20-8.2_s390.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.2_powerpc.deb stable/main/binary-powerpc/libnetpbm9_9.20-8.2_powerpc.deb stable/main/binary-powerpc/netpbm_9.20-8.2_powerpc.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.2_mipsel.deb stable/main/binary-mipsel/libnetpbm9_9.20-8.2_mipsel.deb stable/main/binary-mipsel/netpbm_9.20-8.2_mipsel.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-mips/netpbm_9.20-8.2_mips.deb stable/main/binary-mips/libnetpbm9_9.20-8.2_mips.deb stable/main/binary-mips/libnetpbm9-dev_9.20-8.2_mips.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-m68k/netpbm_9.20-8.2_m68k.deb stable/main/binary-m68k/libnetpbm9-dev_9.20-8.2_m68k.deb stable/main/binary-m68k/libnetpbm9_9.20-8.2_m68k.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-ia64/netpbm_9.20-8.2_ia64.deb stable/main/binary-ia64/libnetpbm9_9.20-8.2_ia64.deb stable/main/binary-ia64/libnetpbm9-dev_9.20-8.2_ia64.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-i386/libnetpbm9-dev_9.20-8.2_i386.deb stable/main/binary-i386/libnetpbm9_9.20-8.2_i386.deb stable/main/binary-i386/netpbm_9.20-8.2_i386.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-arm/netpbm_9.20-8.2_arm.deb stable/main/binary-arm/libnetpbm9_9.20-8.2_arm.deb stable/main/binary-arm/libnetpbm9-dev_9.20-8.2_arm.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-alpha/netpbm_9.20-8.2_alpha.deb stable/main/binary-alpha/libnetpbm9_9.20-8.2_alpha.deb stable/main/binary-alpha/libnetpbm9-dev_9.20-8.2_alpha.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/source/netpbm-free_9.20-8.2.diff.gz stable/main/binary-hppa/libnetpbm9_9.20-8.2_hppa.deb stable/main/binary-hppa/netpbm_9.20-8.2_hppa.deb stable/main/source/netpbm-free_9.20-8.2.dsc stable/main/binary-hppa/libnetpbm9-dev_9.20-8.2_hppa.deb netpbm-free (2:9.20-8.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied another patch by Alan Cox stable/main/binary-sparc/nano_1.0.6-3_sparc.deb stable/main/binary-sparc/nano-udeb_1.0.6-3_sparc.udeb stable/main/binary-sparc/nano-tiny_1.0.6-3_sparc.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-s390/nano-tiny_1.0.6-3_s390.deb stable/main/binary-s390/nano-udeb_1.0.6-3_s390.udeb stable/main/binary-s390/nano_1.0.6-3_s390.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-powerpc/nano_1.0.6-3_powerpc.deb stable/main/binary-powerpc/nano-tiny_1.0.6-3_powerpc.deb stable/main/binary-powerpc/nano-udeb_1.0.6-3_powerpc.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-mipsel/nano-tiny_1.0.6-3_mipsel.deb stable/main/binary-mipsel/nano_1.0.6-3_mipsel.deb stable/main/binary-mipsel/nano-udeb_1.0.6-3_mipsel.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-mips/nano-tiny_1.0.6-3_mips.deb stable/main/binary-mips/nano_1.0.6-3_mips.deb stable/main/binary-mips/nano-udeb_1.0.6-3_mips.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-m68k/nano_1.0.6-3_m68k.deb stable/main/binary-m68k/nano-tiny_1.0.6-3_m68k.deb stable/main/binary-m68k/nano-udeb_1.0.6-3_m68k.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-ia64/nano-tiny_1.0.6-3_ia64.deb stable/main/binary-ia64/nano_1.0.6-3_ia64.deb stable/main/binary-ia64/nano-udeb_1.0.6-3_ia64.udeb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-hppa/nano-udeb_1.0.6-3_hppa.udeb stable/main/binary-hppa/nano-tiny_1.0.6-3_hppa.deb stable/main/binary-hppa/nano_1.0.6-3_hppa.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-arm/nano-udeb_1.0.6-3_arm.udeb stable/main/binary-arm/nano-tiny_1.0.6-3_arm.deb stable/main/binary-arm/nano_1.0.6-3_arm.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-alpha/nano-tiny_1.0.6-3_alpha.deb stable/main/binary-alpha/nano-udeb_1.0.6-3_alpha.udeb stable/main/binary-alpha/nano_1.0.6-3_alpha.deb nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-i386/nano-udeb_1.0.6-3_i386.udeb stable/main/source/nano_1.0.6-3.diff.gz stable/main/binary-i386/nano_1.0.6-3_i386.deb stable/main/binary-i386/nano-tiny_1.0.6-3_i386.deb stable/main/source/nano_1.0.6-3.dsc nano (1.0.6-3) stable; urgency=low * nano.c: hardcode a --disable-wrapping-as-root backport to the stable version. If, as root, you want to enable wrapping, use the Meta-W toggle to enable it after starting nano (fixes: #127634 + 5 more). stable/main/binary-s390/mutt_1.3.28-2.2_s390.deb stable/main/binary-s390/mutt-utf8_1.3.28-2.2_s390.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-powerpc/mutt-utf8_1.3.28-2.2_powerpc.deb stable/main/binary-powerpc/mutt_1.3.28-2.2_powerpc.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-mipsel/mutt-utf8_1.3.28-2.2_mipsel.deb stable/main/binary-mipsel/mutt_1.3.28-2.2_mipsel.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-mips/mutt_1.3.28-2.2_mips.deb stable/main/binary-mips/mutt-utf8_1.3.28-2.2_mips.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-m68k/mutt-utf8_1.3.28-2.2_m68k.deb stable/main/binary-m68k/mutt_1.3.28-2.2_m68k.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-ia64/mutt-utf8_1.3.28-2.2_ia64.deb stable/main/binary-ia64/mutt_1.3.28-2.2_ia64.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-i386/mutt-utf8_1.3.28-2.2_i386.deb stable/main/binary-i386/mutt_1.3.28-2.2_i386.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-hppa/mutt_1.3.28-2.2_hppa.deb stable/main/binary-hppa/mutt-utf8_1.3.28-2.2_hppa.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-arm/mutt_1.3.28-2.2_arm.deb stable/main/binary-arm/mutt-utf8_1.3.28-2.2_arm.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-alpha/mutt_1.3.28-2.2_alpha.deb stable/main/binary-alpha/mutt-utf8_1.3.28-2.2_alpha.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/source/mutt_1.3.28-2.2.dsc stable/main/source/mutt_1.3.28-2.2.diff.gz stable/main/binary-sparc/mutt-utf8_1.3.28-2.2_sparc.deb stable/main/binary-sparc/mutt_1.3.28-2.2_sparc.deb mutt (1.3.28-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial Jensen stable/main/binary-sparc/mozart_1.2.3.20011204-3woody1_sparc.deb stable/main/binary-sparc/mozart-contrib_1.2.3.20011204-3woody1_sparc.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-powerpc/mozart-contrib_1.2.3.20011204-3woody1_powerpc.deb stable/main/binary-powerpc/mozart_1.2.3.20011204-3woody1_powerpc.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-m68k/mozart_1.2.3.20011204-3woody1_m68k.deb stable/main/binary-m68k/mozart-contrib_1.2.3.20011204-3woody1_m68k.deb mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-i386/mozart-contrib_1.2.3.20011204-3woody1_i386.deb stable/main/binary-all/mozart-doc-html_1.2.3.20011204-3woody1_all.deb stable/main/binary-i386/mozart_1.2.3.20011204-3woody1_i386.deb stable/main/source/mozart_1.2.3.20011204-3woody1.dsc stable/main/source/mozart_1.2.3.20011204-3woody1.diff.gz mozart (1.2.3.20011204-3woody1) stable-security; urgency=low * removed mailcap entry (see #197826) to plug user security hole * small changes to compile with stable (thanks to Matt Zimmerman) stable/main/binary-s390/xftp_2.2-18.1_s390.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-powerpc/xftp_2.2-18.1_powerpc.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-mipsel/xftp_2.2-18.1_mipsel.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-mips/xftp_2.2-18.1_mips.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-m68k/xftp_2.2-18.1_m68k.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-ia64/xftp_2.2-18.1_ia64.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-i386/xftp_2.2-18.1_i386.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-hppa/xftp_2.2-18.1_hppa.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-arm/xftp_2.2-18.1_arm.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/binary-alpha/xftp_2.2-18.1_alpha.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/source/moxftp_2.2-18.1.dsc stable/main/source/moxftp_2.2-18.1.diff.gz stable/main/binary-sparc/xftp_2.2-18.1_sparc.deb moxftp (2.2-18.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Erik Tews to fix arbitrary code execution as reported by Knud Erik Højgaard. stable/main/source/minimalist_2.2-4.dsc stable/main/source/minimalist_2.2-4.diff.gz stable/main/binary-all/minimalist_2.2-4_all.deb minimalist (2.2-4) stable-security; urgency=low * Added check to getAuth function that prevents remote code execution (CVE CAN-2003-0902) (Closes: Bug#218364) stable/main/source/mindi_0.58.r5-1woody1.dsc stable/main/binary-i386/mindi_0.58.r5-1woody1_i386.deb stable/main/source/mindi_0.58.r5-1woody1.diff.gz mindi (0.58.r5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Jakob.Lell@web.de to create temporary files securely (CAN-2003-0617) [mindi] stable/main/source/mime-support_3.18-1.3.dsc stable/main/binary-all/mime-support_3.18-1.3_all.deb stable/main/source/mime-support_3.18-1.3.tar.gz mime-support (3.18-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Florian Zumbiehl to fix shell character expansion finally. stable/main/binary-sparc/mikmod_3.1.6-4woody3_sparc.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-s390/mikmod_3.1.6-4woody3_s390.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-powerpc/mikmod_3.1.6-4woody3_powerpc.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-mipsel/mikmod_3.1.6-4woody3_mipsel.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-mips/mikmod_3.1.6-4woody3_mips.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-m68k/mikmod_3.1.6-4woody3_m68k.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-ia64/mikmod_3.1.6-4woody3_ia64.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-hppa/mikmod_3.1.6-4woody3_hppa.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-arm/mikmod_3.1.6-4woody3_arm.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/binary-alpha/mikmod_3.1.6-4woody3_alpha.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/source/mikmod_3.1.6-4woody3.diff.gz stable/main/source/mikmod_3.1.6-4woody3.dsc stable/main/binary-i386/mikmod_3.1.6-4woody3_i386.deb mikmod (3.1.6-4woody3) stable-security; urgency=high * Bump version number due to bad upload of potato package to stable-security stable/main/source/mhonarc_2.5.2-1.3.dsc stable/main/source/mhonarc_2.5.2-1.3.diff.gz stable/main/binary-all/mhonarc_2.5.2-1.3_all.deb mhonarc (2.5.2-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix another cross site scripting problem stable/main/binary-s390/mhc-utils_0.25+20010625-7.1_s390.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-powerpc/mhc-utils_0.25+20010625-7.1_powerpc.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-mipsel/mhc-utils_0.25+20010625-7.1_mipsel.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-mips/mhc-utils_0.25+20010625-7.1_mips.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-ia64/mhc-utils_0.25+20010625-7.1_ia64.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-i386/mhc-utils_0.25+20010625-7.1_i386.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-hppa/mhc-utils_0.25+20010625-7.1_hppa.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-arm/mhc-utils_0.25+20010625-7.1_arm.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-alpha/mhc-utils_0.25+20010625-7.1_alpha.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-m68k/mhc-utils_0.25+20010625-7.1_m68k.deb mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/source/mhc_0.25+20010625-7.1.dsc stable/main/binary-sparc/mhc-utils_0.25+20010625-7.1_sparc.deb stable/main/binary-all/mhc_0.25+20010625-7.1_all.deb stable/main/source/mhc_0.25+20010625-7.1.diff.gz mhc (0.25+20010625-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied a patch to fix predictable temp filename, thanks to Fumitoshi stable/main/binary-sparc/marbles_1.0.2-1woody1_sparc.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-s390/marbles_1.0.2-1woody1_s390.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-powerpc/marbles_1.0.2-1woody1_powerpc.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-mipsel/marbles_1.0.2-1woody1_mipsel.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-mips/marbles_1.0.2-1woody1_mips.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-m68k/marbles_1.0.2-1woody1_m68k.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-ia64/marbles_1.0.2-1woody1_ia64.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-hppa/marbles_1.0.2-1woody1_hppa.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-arm/marbles_1.0.2-1woody1_arm.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-alpha/marbles_1.0.2-1woody1_alpha.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/source/marbles_1.0.2-1woody1.dsc stable/main/source/marbles_1.0.2-1woody1.diff.gz stable/main/binary-i386/marbles_1.0.2-1woody1_i386.deb marbles (1.0.2-1woody1) stable-security; urgency=high * Non maintainer upload by the Security Team * Fixed a buffer overflow in handling environmental variables (CAN-2003-0830). stable/main/binary-sparc/man-db_2.3.20-18.woody.4_sparc.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-s390/man-db_2.3.20-18.woody.4_s390.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-powerpc/man-db_2.3.20-18.woody.4_powerpc.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-mipsel/man-db_2.3.20-18.woody.4_mipsel.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-mips/man-db_2.3.20-18.woody.4_mips.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-m68k/man-db_2.3.20-18.woody.4_m68k.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-ia64/man-db_2.3.20-18.woody.4_ia64.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-hppa/man-db_2.3.20-18.woody.4_hppa.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-arm/man-db_2.3.20-18.woody.4_arm.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-alpha/man-db_2.3.20-18.woody.4_alpha.deb man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/source/man-db_2.3.20-18.woody.4.diff.gz stable/main/binary-i386/man-db_2.3.20-18.woody.4_i386.deb stable/main/source/man-db_2.3.20-18.woody.4.dsc man-db (2.3.20-18.woody.4) stable-security; urgency=medium * Fix segfault caused by an unchecked strcpy() while resolving hard links (closes: #204236). stable/main/binary-sparc/mah-jong_1.4-2_sparc.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-s390/mah-jong_1.4-2_s390.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-powerpc/mah-jong_1.4-2_powerpc.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-mipsel/mah-jong_1.4-2_mipsel.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-mips/mah-jong_1.4-2_mips.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-m68k/mah-jong_1.4-2_m68k.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-ia64/mah-jong_1.4-2_ia64.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-hppa/mah-jong_1.4-2_hppa.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-arm/mah-jong_1.4-2_arm.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-alpha/mah-jong_1.4-2_alpha.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/source/mah-jong_1.4-2.diff.gz stable/main/source/mah-jong_1.4-2.dsc stable/main/binary-i386/mah-jong_1.4-2_i386.deb mah-jong (1.4-2) stable-security; urgency=high * Fix remotely exploitable buffer overflows (CAN-2003-0705). * Fix denial of service due to broken handling of escaping (CAN-2003-0706). * Fix handling of escaping. * Remove useless and potentially dangerous code. * New maintainer email. stable/main/binary-sparc/lyskom-server_2.0.6-1woody1_sparc.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-s390/lyskom-server_2.0.6-1woody1_s390.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-powerpc/lyskom-server_2.0.6-1woody1_powerpc.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-mipsel/lyskom-server_2.0.6-1woody1_mipsel.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-mips/lyskom-server_2.0.6-1woody1_mips.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-m68k/lyskom-server_2.0.6-1woody1_m68k.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-ia64/lyskom-server_2.0.6-1woody1_ia64.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-hppa/lyskom-server_2.0.6-1woody1_hppa.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-arm/lyskom-server_2.0.6-1woody1_arm.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-alpha/lyskom-server_2.0.6-1woody1_alpha.deb lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-i386/lyskom-server_2.0.6-1woody1_i386.deb stable/main/source/lyskom-server_2.0.6-1woody1.dsc stable/main/source/lyskom-server_2.0.6-1woody1.diff.gz lyskom-server (2.0.6-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to fix denial of service (lyskom-server-2.0.7-find-next-text-DoS.patch) stable/main/binary-sparc/lv_4.49.4-7woody2_sparc.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-s390/lv_4.49.4-7woody2_s390.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-powerpc/lv_4.49.4-7woody2_powerpc.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-mipsel/lv_4.49.4-7woody2_mipsel.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-mips/lv_4.49.4-7woody2_mips.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-m68k/lv_4.49.4-7woody2_m68k.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-ia64/lv_4.49.4-7woody2_ia64.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-hppa/lv_4.49.4-7woody2_hppa.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-arm/lv_4.49.4-7woody2_arm.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-alpha/lv_4.49.4-7woody2_alpha.deb lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/source/lv_4.49.4-7woody2.dsc stable/main/binary-i386/lv_4.49.4-7woody2_i386.deb stable/main/source/lv_4.49.4-7woody2.diff.gz lv (4.49.4-7woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not read a configuration file from the current working directory, as it could be untrusted, and update documentation to match * CAN-2003-0188 * Bug #190941 stable/main/binary-sparc/lprng_3.8.10-1.2_sparc.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-s390/lprng_3.8.10-1.2_s390.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-powerpc/lprng_3.8.10-1.2_powerpc.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mipsel/lprng_3.8.10-1.2_mipsel.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mips/lprng_3.8.10-1.2_mips.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-m68k/lprng_3.8.10-1.2_m68k.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-ia64/lprng_3.8.10-1.2_ia64.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-i386/lprng_3.8.10-1.2_i386.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-hppa/lprng_3.8.10-1.2_hppa.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-arm/lprng_3.8.10-1.2_arm.deb lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/source/lprng_3.8.10-1.2.dsc stable/main/binary-all/lprng-doc_3.8.10-1.2_all.deb stable/main/binary-alpha/lprng_3.8.10-1.2_alpha.deb stable/main/source/lprng_3.8.10-1.2.diff.gz lprng (3.8.10-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-sparc/liece-dcc_2.0+0.20020217cvs-2.1_sparc.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-s390/liece-dcc_2.0+0.20020217cvs-2.1_s390.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-powerpc/liece-dcc_2.0+0.20020217cvs-2.1_powerpc.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-mipsel/liece-dcc_2.0+0.20020217cvs-2.1_mipsel.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-mips/liece-dcc_2.0+0.20020217cvs-2.1_mips.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-m68k/liece-dcc_2.0+0.20020217cvs-2.1_m68k.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-ia64/liece-dcc_2.0+0.20020217cvs-2.1_ia64.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-hppa/liece-dcc_2.0+0.20020217cvs-2.1_hppa.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-arm/liece-dcc_2.0+0.20020217cvs-2.1_arm.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-alpha/liece-dcc_2.0+0.20020217cvs-2.1_alpha.deb liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-i386/liece-dcc_2.0+0.20020217cvs-2.1_i386.deb stable/main/binary-all/liece_2.0+0.20020217cvs-2.1_all.deb stable/main/source/liece_2.0+0.20020217cvs-2.1.dsc stable/main/source/liece_2.0+0.20020217cvs-2.1.diff.gz liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from OHASHI Akira to create temporary files safely stable/main/binary-s390/libprinterconf0_0.5-4.woody.2_s390.deb stable/main/binary-s390/pconf-detect_0.5-4.woody.2_s390.deb stable/main/binary-s390/libprinterconf-dev_0.5-4.woody.2_s390.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-powerpc/libprinterconf-dev_0.5-4.woody.2_powerpc.deb stable/main/binary-powerpc/libprinterconf0_0.5-4.woody.2_powerpc.deb stable/main/binary-powerpc/pconf-detect_0.5-4.woody.2_powerpc.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mipsel/libprinterconf0_0.5-4.woody.2_mipsel.deb stable/main/binary-mipsel/libprinterconf-dev_0.5-4.woody.2_mipsel.deb stable/main/binary-mipsel/pconf-detect_0.5-4.woody.2_mipsel.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-mips/libprinterconf-dev_0.5-4.woody.2_mips.deb stable/main/binary-mips/libprinterconf0_0.5-4.woody.2_mips.deb stable/main/binary-mips/pconf-detect_0.5-4.woody.2_mips.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-m68k/libprinterconf-dev_0.5-4.woody.2_m68k.deb stable/main/binary-m68k/pconf-detect_0.5-4.woody.2_m68k.deb stable/main/binary-m68k/libprinterconf0_0.5-4.woody.2_m68k.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-ia64/libprinterconf0_0.5-4.woody.2_ia64.deb stable/main/binary-ia64/libprinterconf-dev_0.5-4.woody.2_ia64.deb stable/main/binary-ia64/pconf-detect_0.5-4.woody.2_ia64.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-i386/pconf-detect_0.5-4.woody.2_i386.deb stable/main/binary-i386/libprinterconf0_0.5-4.woody.2_i386.deb stable/main/binary-i386/libprinterconf-dev_0.5-4.woody.2_i386.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-hppa/libprinterconf0_0.5-4.woody.2_hppa.deb stable/main/binary-hppa/pconf-detect_0.5-4.woody.2_hppa.deb stable/main/binary-hppa/libprinterconf-dev_0.5-4.woody.2_hppa.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-arm/pconf-detect_0.5-4.woody.2_arm.deb stable/main/binary-arm/libprinterconf0_0.5-4.woody.2_arm.deb stable/main/binary-arm/libprinterconf-dev_0.5-4.woody.2_arm.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-alpha/pconf-detect_0.5-4.woody.2_alpha.deb stable/main/binary-alpha/libprinterconf0_0.5-4.woody.2_alpha.deb stable/main/binary-alpha/libprinterconf-dev_0.5-4.woody.2_alpha.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-sparc/libprinterconf0_0.5-4.woody.2_sparc.deb stable/main/source/libprinterconf_0.5-4.woody.2.dsc stable/main/binary-sparc/libprinterconf-dev_0.5-4.woody.2_sparc.deb stable/main/source/libprinterconf_0.5-4.woody.2.diff.gz stable/main/binary-sparc/pconf-detect_0.5-4.woody.2_sparc.deb libprinterconf (0.5-4.woody.2) stable; urgency=medium * Rebuilt with binaries this time and a useful distribution * No changes made, though stable/main/binary-s390/libpng3_1.2.1-1.1.woody.3_s390.deb stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.3_s390.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.3_powerpc.deb stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.3_powerpc.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.3_mipsel.deb stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.3_mipsel.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mips/libpng3_1.2.1-1.1.woody.3_mips.deb stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.3_mips.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.3_m68k.deb stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.3_m68k.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.3_ia64.deb stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.3_ia64.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.3_i386.deb stable/main/binary-i386/libpng3_1.2.1-1.1.woody.3_i386.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.3_hppa.deb stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.3_hppa.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-arm/libpng3_1.2.1-1.1.woody.3_arm.deb stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.3_arm.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.3_alpha.deb stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.3_alpha.deb libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.3_sparc.deb stable/main/source/libpng3_1.2.1-1.1.woody.3.diff.gz stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.3_sparc.deb stable/main/source/libpng3_1.2.1-1.1.woody.3.dsc libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-s390/libpng2_1.0.12-3.woody.3_s390.deb stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.3_s390.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.3_powerpc.deb stable/main/binary-powerpc/libpng2_1.0.12-3.woody.3_powerpc.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mipsel/libpng2_1.0.12-3.woody.3_mipsel.deb stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.3_mipsel.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-mips/libpng2_1.0.12-3.woody.3_mips.deb stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.3_mips.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.3_m68k.deb stable/main/binary-m68k/libpng2_1.0.12-3.woody.3_m68k.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-ia64/libpng2_1.0.12-3.woody.3_ia64.deb stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.3_ia64.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.3_i386.deb stable/main/binary-i386/libpng2_1.0.12-3.woody.3_i386.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-hppa/libpng2_1.0.12-3.woody.3_hppa.deb stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.3_hppa.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-arm/libpng2_1.0.12-3.woody.3_arm.deb stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.3_arm.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-alpha/libpng2_1.0.12-3.woody.3_alpha.deb stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.3_alpha.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/source/libpng_1.0.12-3.woody.3.dsc stable/main/source/libpng_1.0.12-3.woody.3.diff.gz stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.3_sparc.deb stable/main/binary-sparc/libpng2_1.0.12-3.woody.3_sparc.deb libpng (1.0.12-3.woody.3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch to pngrtran.c by Glenn Randers-Pehrson to fix a buffer overrun. stable/main/binary-all/libphp-adodb_1.51-1.1_all.deb stable/main/source/libphp-adodb_1.51-1.1.dsc stable/main/source/libphp-adodb_1.51-1.1.diff.gz libphp-adodb (1.51-1.1) stable; urgency=low * Fix GetUpdateSQL() function problem. (Closes: #177332) Old function will update all datasets in the table, because the where statement wasn't created correctly. * Change maintainer name. stable/main/binary-sparc/libparagui1.0_0.1.0-1_sparc.deb stable/main/binary-sparc/libparagui1.0-dev_0.1.0-1_sparc.deb stable/main/binary-sparc/paragui-themes_0.1.0-1_sparc.deb libparagui1.0 (0.1.0-1) unstable; urgency=low * Initial Release (Closes: #109099) * added patch that let's paragui-config report /usr/include/paragui-1.0 as the include directory stable/main/binary-sparc/libpam-smb_1.1.6-1.1woody1_sparc.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-s390/libpam-smb_1.1.6-1.1woody1_s390.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-powerpc/libpam-smb_1.1.6-1.1woody1_powerpc.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-mipsel/libpam-smb_1.1.6-1.1woody1_mipsel.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-mips/libpam-smb_1.1.6-1.1woody1_mips.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-m68k/libpam-smb_1.1.6-1.1woody1_m68k.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-ia64/libpam-smb_1.1.6-1.1woody1_ia64.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-hppa/libpam-smb_1.1.6-1.1woody1_hppa.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-arm/libpam-smb_1.1.6-1.1woody1_arm.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/binary-alpha/libpam-smb_1.1.6-1.1woody1_alpha.deb libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/source/libpam-smb_1.1.6-1.1woody1.diff.gz stable/main/binary-i386/libpam-smb_1.1.6-1.1woody1_i386.deb stable/main/source/libpam-smb_1.1.6-1.1woody1.dsc libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Dave Airlie to use strncpy rather than strcpy [pam_smb/smbval/smblib.c] stable/main/source/libmailtools-perl_1.44-1woody2.dsc stable/main/binary-all/libmailtools-perl_1.44-1woody2_all.deb stable/main/binary-all/mailtools_1.44-1woody2_all.deb stable/main/source/libmailtools-perl_1.44-1woody2.diff.gz libmailtools-perl (1.44-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove the 'mail' mailer entirely, as it is problematic. This was the approach taken upstream and by other vendors, and as far as I can tell, no program specifically requests this buggy type of mailer interface (CAN-2002-1271) stable/main/binary-sparc/liblocale-gettext-perl_1.01-11a.woody_sparc.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-s390/liblocale-gettext-perl_1.01-11a.woody_s390.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-powerpc/liblocale-gettext-perl_1.01-11a.woody_powerpc.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-mipsel/liblocale-gettext-perl_1.01-11a.woody_mipsel.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-mips/liblocale-gettext-perl_1.01-11a.woody_mips.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-m68k/liblocale-gettext-perl_1.01-11a.woody_m68k.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-ia64/liblocale-gettext-perl_1.01-11a.woody_ia64.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-hppa/liblocale-gettext-perl_1.01-11a.woody_hppa.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-arm/liblocale-gettext-perl_1.01-11a.woody_arm.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-alpha/liblocale-gettext-perl_1.01-11a.woody_alpha.deb liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/source/liblocale-gettext-perl_1.01-11a.woody.dsc stable/main/binary-i386/liblocale-gettext-perl_1.01-11a.woody_i386.deb stable/main/source/liblocale-gettext-perl_1.01-11a.woody.diff.gz liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low * The bugs #156381 is also in the stable version of the package. Since it renders basic packages like debconf unusable when it's installed, I'm providing this updated package to fix it. * Added the include in the .xs file this time. * Really stupid version number to have a version number lower than 1.01-11bis which is in unstable... stable/main/binary-ia64/libdbd-mysql-perl_1.2216-2.0.1_ia64.deb libdbd-mysql-perl (1.2216-2.0.1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild for ia64: Closes: #191552 stable/main/binary-sparc/leksbot_1.2-3.1woody1_sparc.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-s390/leksbot_1.2-3.1woody1_s390.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-powerpc/leksbot_1.2-3.1woody1_powerpc.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-mipsel/leksbot_1.2-3.1woody1_mipsel.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-mips/leksbot_1.2-3.1woody1_mips.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-m68k/leksbot_1.2-3.1woody1_m68k.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-ia64/leksbot_1.2-3.1woody1_ia64.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-hppa/leksbot_1.2-3.1woody1_hppa.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-arm/leksbot_1.2-3.1woody1_arm.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-alpha/leksbot_1.2-3.1woody1_alpha.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/source/leksbot_1.2-3.1woody1.diff.gz stable/main/source/leksbot_1.2-3.1woody1.dsc stable/main/binary-i386/leksbot_1.2-3.1woody1_i386.deb leksbot (1.2-3.1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Do not install setuid root (really), and neither make any files world-writable stable/main/binary-s390/krb5-kdc_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkrb5-dev_1.2.4-5woody4_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-admin-server_1.2.4-5woody4_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody4_s390.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkrb53_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody4_powerpc.deb stable/main/binary-powerpc/libkadm55_1.2.4-5woody4_powerpc.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-mipsel/krb5-clients_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkadm55_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/libkrb53_1.2.4-5woody4_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody4_mipsel.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkrb53_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkadm55_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody4_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody4_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody4_mips.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-m68k/krb5-user_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-kdc_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody4_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody4_m68k.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-ia64/libkadm55_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/libkrb53_1.2.4-5woody4_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody4_ia64.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-i386/krb5-clients_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-ftpd_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkrb5-dev_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-telnetd_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody4_i386.deb stable/main/binary-i386/libkrb53_1.2.4-5woody4_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody4_i386.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-hppa/krb5-kdc_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkrb53_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkadm55_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody4_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody4_hppa.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-arm/krb5-user_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody4_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-admin-server_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-kdc_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-telnetd_1.2.4-5woody4_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody4_arm.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-user_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody4_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody4_alpha.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody4_sparc.deb stable/main/source/krb5_1.2.4-5woody4.dsc stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody4_sparc.deb stable/main/binary-all/krb5-doc_1.2.4-5woody4_all.deb stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody4_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody4_sparc.deb stable/main/source/krb5_1.2.4-5woody4.diff.gz stable/main/binary-sparc/libkadm55_1.2.4-5woody4_sparc.deb krb5 (1.2.4-5woody4) stable-security; urgency=high * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in Kerberos 4 - Add -X option to krb5kdc and krb524d. By default cross-realm is no longer supported for krb4 as it is a security hole. - Add protection to isolate krb5 keys from krb4 especially for the TGS key - Remove support for the MIT extension to krb4 to use 3DES keys as it is insecure. * Patch to various DOS issues where the KDC assumes principal names have certain components. Fixes CAN-2003-0072 * Patch for CERT VU#516825: Additional errors in XDR that may lead to denial of service. stable/main/binary-all/kernel-doc-2.4.18_2.4.18-13_all.deb stable/main/source/kernel-source-2.4.18_2.4.18-13.diff.gz stable/main/binary-all/kernel-source-2.4.18_2.4.18-13_all.deb stable/main/source/kernel-source-2.4.18_2.4.18-13.dsc kernel-source-2.4.18 (2.4.18-13) stable-security; urgency=high * Fixed steal_locks race introduced in 2.4.18-10: . fs/binfmt_elf.c . fs/exec.c stable/main/binary-sparc/mkcramfs_2.4.17-1woody1_sparc.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-s390/mkcramfs_2.4.17-1woody1_s390.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-powerpc/mkcramfs_2.4.17-1woody1_powerpc.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mipsel/mkcramfs_2.4.17-1woody1_mipsel.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mips/mkcramfs_2.4.17-1woody1_mips.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-m68k/mkcramfs_2.4.17-1woody1_m68k.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-ia64/mkcramfs_2.4.17-1woody1_ia64.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-hppa/mkcramfs_2.4.17-1woody1_hppa.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-arm/mkcramfs_2.4.17-1woody1_arm.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-alpha/mkcramfs_2.4.17-1woody1_alpha.deb kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody1_all.deb stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody1_all.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.dsc stable/main/binary-i386/mkcramfs_2.4.17-1woody1_i386.deb stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.diff.gz kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply security fixes from 2.4.18-9 - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody1_mips.deb stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1_all.deb stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody1_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.tar.gz stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody1_mips.deb stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody1_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.dsc kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody1) stable-security; urgency=high * fix ptrace security hole stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody1_powerpc.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.tar.gz stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody1_powerpc.deb stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody1_all.deb stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.dsc kernel-patch-2.4.18-powerpc (2.4.18-1woody1) stable; urgency=high * Build against kernel-source-2.4.18 version 2.4.18-9 to pick up security fixes. * Backport change from unstable to disable CMD640 support - fixes some boot failures. stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.dsc stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1_all.deb stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.diff.gz kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1.1) stable-security; urgency=high * NMU * Added an s390 specific patch for the ptrace vulnerability, provided by Martin Schwidefsky . stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody2_mipsel.deb stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody2_mipsel.deb kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1 * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes: - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions * remove Readme.Debian from the diff stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1 * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes: - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall) - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops") - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions * remove Readme.Debian from the diff stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.dsc stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.tar.gz stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.2.2_s390.deb stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2_s390.deb kernel-image-2.4.17-s390 (2.4.17-2.woody.2.2) stable-security; urgency=high * NMU * revert accidental configuration changes stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.tar.gz stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody3_i386.deb stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody3_i386.deb stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.dsc kernel-image-2.2.20-i386 (2.2.20-5woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild with pcmcia-cs from stable-security so that katie ACCEPTs us stable/main/binary-sparc/kmtrace_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kbabel_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kbabel-dev_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kspy_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kdesdk_2.2.2-3.2_sparc.deb stable/main/binary-sparc/poxml_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kstartperf_2.2.2-3.2_sparc.deb stable/main/binary-sparc/kexample_2.2.2-3.2_sparc.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/kbabel_2.2.2-3.2_s390.deb stable/main/binary-s390/kdesdk_2.2.2-3.2_s390.deb stable/main/binary-s390/kmtrace_2.2.2-3.2_s390.deb stable/main/binary-s390/kspy_2.2.2-3.2_s390.deb stable/main/binary-s390/kstartperf_2.2.2-3.2_s390.deb stable/main/binary-s390/kexample_2.2.2-3.2_s390.deb stable/main/binary-s390/poxml_2.2.2-3.2_s390.deb stable/main/binary-s390/kbabel-dev_2.2.2-3.2_s390.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/kbabel-dev_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kdesdk_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kstartperf_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kspy_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kbabel_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/poxml_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kmtrace_2.2.2-3.2_powerpc.deb stable/main/binary-powerpc/kexample_2.2.2-3.2_powerpc.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/kexample_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kmtrace_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kbabel-dev_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kstartperf_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kbabel_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kspy_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/poxml_2.2.2-3.2_mipsel.deb stable/main/binary-mipsel/kdesdk_2.2.2-3.2_mipsel.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/poxml_2.2.2-3.2_mips.deb stable/main/binary-mips/kbabel-dev_2.2.2-3.2_mips.deb stable/main/binary-mips/kmtrace_2.2.2-3.2_mips.deb stable/main/binary-mips/kspy_2.2.2-3.2_mips.deb stable/main/binary-mips/kbabel_2.2.2-3.2_mips.deb stable/main/binary-mips/kexample_2.2.2-3.2_mips.deb stable/main/binary-mips/kdesdk_2.2.2-3.2_mips.deb stable/main/binary-mips/kstartperf_2.2.2-3.2_mips.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/kbabel-dev_2.2.2-3.2_m68k.deb stable/main/binary-m68k/poxml_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kmtrace_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kexample_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kbabel_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kstartperf_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kspy_2.2.2-3.2_m68k.deb stable/main/binary-m68k/kdesdk_2.2.2-3.2_m68k.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/kdesdk_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kspy_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kmtrace_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kexample_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kbabel_2.2.2-3.2_ia64.deb stable/main/binary-ia64/poxml_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kbabel-dev_2.2.2-3.2_ia64.deb stable/main/binary-ia64/kstartperf_2.2.2-3.2_ia64.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/kstartperf_2.2.2-3.2_i386.deb stable/main/binary-i386/kspy_2.2.2-3.2_i386.deb stable/main/binary-i386/kbabel_2.2.2-3.2_i386.deb stable/main/binary-i386/kdesdk_2.2.2-3.2_i386.deb stable/main/binary-i386/kexample_2.2.2-3.2_i386.deb stable/main/binary-i386/kmtrace_2.2.2-3.2_i386.deb stable/main/binary-i386/kbabel-dev_2.2.2-3.2_i386.deb stable/main/binary-i386/poxml_2.2.2-3.2_i386.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/kstartperf_2.2.2-3.2_arm.deb stable/main/binary-arm/kspy_2.2.2-3.2_arm.deb stable/main/binary-arm/kmtrace_2.2.2-3.2_arm.deb stable/main/binary-arm/kdesdk_2.2.2-3.2_arm.deb stable/main/binary-arm/poxml_2.2.2-3.2_arm.deb stable/main/binary-arm/kbabel-dev_2.2.2-3.2_arm.deb stable/main/binary-arm/kbabel_2.2.2-3.2_arm.deb stable/main/binary-arm/kexample_2.2.2-3.2_arm.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/poxml_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kbabel_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kmtrace_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kstartperf_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kexample_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kdesdk_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kbabel-dev_2.2.2-3.2_alpha.deb stable/main/binary-alpha/kspy_2.2.2-3.2_alpha.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/poxml_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kexample_2.2.2-3.2_hppa.deb stable/main/binary-all/kdesdk-scripts_2.2.2-3.2_all.deb stable/main/binary-hppa/kdesdk_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kbabel_2.2.2-3.2_hppa.deb stable/main/source/kdesdk_2.2.2-3.2.dsc stable/main/binary-hppa/kstartperf_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kbabel-dev_2.2.2-3.2_hppa.deb stable/main/binary-all/kdepalettes_2.2.2-3.2_all.deb stable/main/binary-hppa/kmtrace_2.2.2-3.2_hppa.deb stable/main/binary-hppa/kspy_2.2.2-3.2_hppa.deb stable/main/source/kdesdk_2.2.2-3.2.diff.gz stable/main/binary-all/kapptemplate_2.2.2-3.2_all.deb stable/main/binary-all/kdesdk-doc_2.2.2-3.2_all.deb kdesdk (2.2.2-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-sparc/kmail_2.2.2-14.6_sparc.deb stable/main/binary-sparc/klisa_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libmimelib-dev_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libkdenetwork1_2.2.2-14.6_sparc.deb stable/main/binary-sparc/korn_2.2.2-14.6_sparc.deb stable/main/binary-sparc/knewsticker_2.2.2-14.6_sparc.deb stable/main/binary-sparc/knode_2.2.2-14.6_sparc.deb stable/main/binary-sparc/libmimelib1_2.2.2-14.6_sparc.deb stable/main/binary-sparc/ksirc_2.2.2-14.6_sparc.deb stable/main/binary-sparc/ktalkd_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kit_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kdict_2.2.2-14.6_sparc.deb stable/main/binary-sparc/kppp_2.2.2-14.6_sparc.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-s390/kit_2.2.2-14.6_s390.deb stable/main/binary-s390/libmimelib-dev_2.2.2-14.6_s390.deb stable/main/binary-s390/klisa_2.2.2-14.6_s390.deb stable/main/binary-s390/kdict_2.2.2-14.6_s390.deb stable/main/binary-s390/ksirc_2.2.2-14.6_s390.deb stable/main/binary-s390/korn_2.2.2-14.6_s390.deb stable/main/binary-s390/kppp_2.2.2-14.6_s390.deb stable/main/binary-s390/knode_2.2.2-14.6_s390.deb stable/main/binary-s390/libmimelib1_2.2.2-14.6_s390.deb stable/main/binary-s390/libkdenetwork1_2.2.2-14.6_s390.deb stable/main/binary-s390/kmail_2.2.2-14.6_s390.deb stable/main/binary-s390/knewsticker_2.2.2-14.6_s390.deb stable/main/binary-s390/ktalkd_2.2.2-14.6_s390.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-powerpc/ksirc_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libmimelib1_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kdict_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/korn_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kmail_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/knode_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/ktalkd_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/klisa_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/knewsticker_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kit_2.2.2-14.6_powerpc.deb stable/main/binary-powerpc/kppp_2.2.2-14.6_powerpc.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-mipsel/kdict_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/ksirc_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libmimelib1_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/klisa_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kppp_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/korn_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kit_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/kmail_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/knewsticker_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/knode_2.2.2-14.6_mipsel.deb stable/main/binary-mipsel/ktalkd_2.2.2-14.6_mipsel.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-mips/korn_2.2.2-14.6_mips.deb stable/main/binary-mips/kppp_2.2.2-14.6_mips.deb stable/main/binary-mips/libkdenetwork1_2.2.2-14.6_mips.deb stable/main/binary-mips/kit_2.2.2-14.6_mips.deb stable/main/binary-mips/kdict_2.2.2-14.6_mips.deb stable/main/binary-mips/kmail_2.2.2-14.6_mips.deb stable/main/binary-mips/klisa_2.2.2-14.6_mips.deb stable/main/binary-mips/ktalkd_2.2.2-14.6_mips.deb stable/main/binary-mips/libmimelib1_2.2.2-14.6_mips.deb stable/main/binary-mips/libmimelib-dev_2.2.2-14.6_mips.deb stable/main/binary-mips/ksirc_2.2.2-14.6_mips.deb stable/main/binary-mips/knode_2.2.2-14.6_mips.deb stable/main/binary-mips/knewsticker_2.2.2-14.6_mips.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-m68k/libkdenetwork1_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kmail_2.2.2-14.6_m68k.deb stable/main/binary-m68k/libmimelib1_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kppp_2.2.2-14.6_m68k.deb stable/main/binary-m68k/korn_2.2.2-14.6_m68k.deb stable/main/binary-m68k/knewsticker_2.2.2-14.6_m68k.deb stable/main/binary-m68k/libmimelib-dev_2.2.2-14.6_m68k.deb stable/main/binary-m68k/ksirc_2.2.2-14.6_m68k.deb stable/main/binary-m68k/ktalkd_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kit_2.2.2-14.6_m68k.deb stable/main/binary-m68k/knode_2.2.2-14.6_m68k.deb stable/main/binary-m68k/kdict_2.2.2-14.6_m68k.deb stable/main/binary-m68k/klisa_2.2.2-14.6_m68k.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-hppa/libmimelib-dev_2.2.2-14.6_hppa.deb stable/main/binary-hppa/libkdenetwork1_2.2.2-14.6_hppa.deb stable/main/binary-hppa/libmimelib1_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kmail_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kppp_2.2.2-14.6_hppa.deb stable/main/binary-hppa/knewsticker_2.2.2-14.6_hppa.deb stable/main/binary-hppa/korn_2.2.2-14.6_hppa.deb stable/main/binary-hppa/ktalkd_2.2.2-14.6_hppa.deb stable/main/binary-hppa/klisa_2.2.2-14.6_hppa.deb stable/main/binary-hppa/knode_2.2.2-14.6_hppa.deb stable/main/binary-hppa/ksirc_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kdict_2.2.2-14.6_hppa.deb stable/main/binary-hppa/kit_2.2.2-14.6_hppa.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-arm/knewsticker_2.2.2-14.6_arm.deb stable/main/binary-arm/libmimelib-dev_2.2.2-14.6_arm.deb stable/main/binary-arm/kmail_2.2.2-14.6_arm.deb stable/main/binary-arm/kppp_2.2.2-14.6_arm.deb stable/main/binary-arm/kdict_2.2.2-14.6_arm.deb stable/main/binary-arm/libkdenetwork1_2.2.2-14.6_arm.deb stable/main/binary-arm/korn_2.2.2-14.6_arm.deb stable/main/binary-arm/klisa_2.2.2-14.6_arm.deb stable/main/binary-arm/ktalkd_2.2.2-14.6_arm.deb stable/main/binary-arm/ksirc_2.2.2-14.6_arm.deb stable/main/binary-arm/knode_2.2.2-14.6_arm.deb stable/main/binary-arm/kit_2.2.2-14.6_arm.deb stable/main/binary-arm/libmimelib1_2.2.2-14.6_arm.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-alpha/knode_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kit_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kppp_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kdict_2.2.2-14.6_alpha.deb stable/main/binary-alpha/klisa_2.2.2-14.6_alpha.deb stable/main/binary-alpha/ksirc_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libmimelib1_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libkdenetwork1_2.2.2-14.6_alpha.deb stable/main/binary-alpha/knewsticker_2.2.2-14.6_alpha.deb stable/main/binary-alpha/libmimelib-dev_2.2.2-14.6_alpha.deb stable/main/binary-alpha/kmail_2.2.2-14.6_alpha.deb stable/main/binary-alpha/ktalkd_2.2.2-14.6_alpha.deb stable/main/binary-alpha/korn_2.2.2-14.6_alpha.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-ia64/libkdenetwork1_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kit_2.2.2-14.6_ia64.deb stable/main/binary-ia64/libmimelib1_2.2.2-14.6_ia64.deb stable/main/binary-ia64/klisa_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kmail_2.2.2-14.6_ia64.deb stable/main/binary-ia64/ktalkd_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kppp_2.2.2-14.6_ia64.deb stable/main/binary-ia64/kdict_2.2.2-14.6_ia64.deb stable/main/source/kdenetwork_2.2.2-14.6.diff.gz stable/main/binary-ia64/libmimelib-dev_2.2.2-14.6_ia64.deb stable/main/binary-ia64/ksirc_2.2.2-14.6_ia64.deb stable/main/binary-ia64/knewsticker_2.2.2-14.6_ia64.deb stable/main/binary-ia64/knode_2.2.2-14.6_ia64.deb stable/main/source/kdenetwork_2.2.2-14.6.dsc stable/main/binary-ia64/korn_2.2.2-14.6_ia64.deb kdenetwork (4:2.2.2-14.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patches to fix several potential vulnerabilities. http://www.kde.org/info/security/advisory-20021220-1.txt stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.8_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.8_sparc.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.8_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.8_s390.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libkmid_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.8_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.8_powerpc.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.8_mipsel.deb stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.8_mipsel.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.8_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.8_mips.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/libkmid_2.2.2-13.woody.8_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.8_m68k.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-ia64/libkmid_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.8_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.8_ia64.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.8_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.8_hppa.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-arm/libarts_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.8_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.8_arm.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.8_alpha.deb stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.8_alpha.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.8_i386.deb stable/main/source/kdelibs_2.2.2-13.woody.8.dsc stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.8_all.deb stable/main/source/kdelibs_2.2.2-13.woody.8.diff.gz stable/main/binary-i386/libkmid_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libarts_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.8_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.8_i386.deb kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply the following patches from upstream: - post-2.2.2-kdelibs-http.patch (CAN-2003-0459) - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370) - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370) * These address the issues described in: - http://www.kde.org/info/security/advisory-20030602-1.txt - An upcoming KDE advisory regarding CAN-2003-0370 stable/main/binary-sparc/kcoloredit_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kpaint_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kooka_2.2.2-6.11_sparc.deb stable/main/binary-sparc/libkscan-dev_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kfract_2.2.2-6.11_sparc.deb stable/main/binary-sparc/ksnapshot_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kamera_2.2.2-6.11_sparc.deb stable/main/binary-sparc/libkscan1_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kghostview_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kiconedit_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kview_2.2.2-6.11_sparc.deb stable/main/binary-sparc/kruler_2.2.2-6.11_sparc.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-s390/kiconedit_2.2.2-6.11_s390.deb stable/main/binary-s390/ksnapshot_2.2.2-6.11_s390.deb stable/main/binary-s390/libkscan1_2.2.2-6.11_s390.deb stable/main/binary-s390/kview_2.2.2-6.11_s390.deb stable/main/binary-s390/kcoloredit_2.2.2-6.11_s390.deb stable/main/binary-s390/kamera_2.2.2-6.11_s390.deb stable/main/binary-s390/kfract_2.2.2-6.11_s390.deb stable/main/binary-s390/libkscan-dev_2.2.2-6.11_s390.deb stable/main/binary-s390/kruler_2.2.2-6.11_s390.deb stable/main/binary-s390/kooka_2.2.2-6.11_s390.deb stable/main/binary-s390/kpaint_2.2.2-6.11_s390.deb stable/main/binary-s390/kghostview_2.2.2-6.11_s390.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-powerpc/kamera_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/ksnapshot_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kview_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/libkscan1_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kfract_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kooka_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kpaint_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kghostview_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kiconedit_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kruler_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/kcoloredit_2.2.2-6.11_powerpc.deb stable/main/binary-powerpc/libkscan-dev_2.2.2-6.11_powerpc.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-mipsel/kghostview_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kiconedit_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/ksnapshot_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kamera_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/libkscan1_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kfract_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kcoloredit_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kruler_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kooka_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/libkscan-dev_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kview_2.2.2-6.11_mipsel.deb stable/main/binary-mipsel/kpaint_2.2.2-6.11_mipsel.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-mips/kiconedit_2.2.2-6.11_mips.deb stable/main/binary-mips/kfract_2.2.2-6.11_mips.deb stable/main/binary-mips/kooka_2.2.2-6.11_mips.deb stable/main/binary-mips/kghostview_2.2.2-6.11_mips.deb stable/main/binary-mips/kpaint_2.2.2-6.11_mips.deb stable/main/binary-mips/libkscan-dev_2.2.2-6.11_mips.deb stable/main/binary-mips/kview_2.2.2-6.11_mips.deb stable/main/binary-mips/kruler_2.2.2-6.11_mips.deb stable/main/binary-mips/ksnapshot_2.2.2-6.11_mips.deb stable/main/binary-mips/kcoloredit_2.2.2-6.11_mips.deb stable/main/binary-mips/kamera_2.2.2-6.11_mips.deb stable/main/binary-mips/libkscan1_2.2.2-6.11_mips.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-m68k/kpaint_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kcoloredit_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kghostview_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kooka_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kfract_2.2.2-6.11_m68k.deb stable/main/binary-m68k/libkscan-dev_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kamera_2.2.2-6.11_m68k.deb stable/main/binary-m68k/ksnapshot_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kruler_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kiconedit_2.2.2-6.11_m68k.deb stable/main/binary-m68k/kview_2.2.2-6.11_m68k.deb stable/main/binary-m68k/libkscan1_2.2.2-6.11_m68k.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-ia64/kghostview_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kruler_2.2.2-6.11_ia64.deb stable/main/binary-ia64/libkscan-dev_2.2.2-6.11_ia64.deb stable/main/binary-ia64/ksnapshot_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kooka_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kpaint_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kview_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kfract_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kiconedit_2.2.2-6.11_ia64.deb stable/main/binary-ia64/libkscan1_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kamera_2.2.2-6.11_ia64.deb stable/main/binary-ia64/kcoloredit_2.2.2-6.11_ia64.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-i386/libkscan1_2.2.2-6.11_i386.deb stable/main/binary-i386/kpaint_2.2.2-6.11_i386.deb stable/main/binary-i386/kiconedit_2.2.2-6.11_i386.deb stable/main/binary-i386/kooka_2.2.2-6.11_i386.deb stable/main/binary-i386/kruler_2.2.2-6.11_i386.deb stable/main/binary-i386/libkscan-dev_2.2.2-6.11_i386.deb stable/main/binary-i386/ksnapshot_2.2.2-6.11_i386.deb stable/main/binary-i386/kfract_2.2.2-6.11_i386.deb stable/main/binary-i386/kamera_2.2.2-6.11_i386.deb stable/main/binary-i386/kghostview_2.2.2-6.11_i386.deb stable/main/binary-i386/kcoloredit_2.2.2-6.11_i386.deb stable/main/binary-i386/kview_2.2.2-6.11_i386.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-hppa/kview_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kcoloredit_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kfract_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kruler_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kghostview_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kamera_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kiconedit_2.2.2-6.11_hppa.deb stable/main/binary-hppa/ksnapshot_2.2.2-6.11_hppa.deb stable/main/binary-hppa/kpaint_2.2.2-6.11_hppa.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-alpha/kiconedit_2.2.2-6.11_alpha.deb stable/main/source/kdegraphics_2.2.2-6.11.diff.gz stable/main/binary-alpha/libkscan1_2.2.2-6.11_alpha.deb stable/main/source/kdegraphics_2.2.2-6.11.dsc stable/main/binary-alpha/kcoloredit_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kview_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kamera_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kfract_2.2.2-6.11_alpha.deb stable/main/binary-alpha/libkscan-dev_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kruler_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kghostview_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kooka_2.2.2-6.11_alpha.deb stable/main/binary-alpha/kpaint_2.2.2-6.11_alpha.deb stable/main/binary-alpha/ksnapshot_2.2.2-6.11_alpha.deb kdegraphics (4:2.2.2-6.11) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch so ghostscript won't execute arbitrary commands hidden inside of postscript files. stable/main/binary-sparc/konsole_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libkonq3_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kscreensaver_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kate_2.2.2-14.7_sparc.deb stable/main/binary-sparc/konqueror_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-dev_2.2.2-14.7_sparc.deb stable/main/binary-sparc/libkonq-dev_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdm_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase_2.2.2-14.7_sparc.deb stable/main/binary-sparc/kdebase-libs_2.2.2-14.7_sparc.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-s390/kdebase-dev_2.2.2-14.7_s390.deb stable/main/binary-s390/kate_2.2.2-14.7_s390.deb stable/main/binary-s390/kscreensaver_2.2.2-14.7_s390.deb stable/main/binary-s390/konqueror_2.2.2-14.7_s390.deb stable/main/binary-s390/kdm_2.2.2-14.7_s390.deb stable/main/binary-s390/libkonq-dev_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase_2.2.2-14.7_s390.deb stable/main/binary-s390/libkonq3_2.2.2-14.7_s390.deb stable/main/binary-s390/konsole_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase-libs_2.2.2-14.7_s390.deb stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.7_s390.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-powerpc/kdebase-libs_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdm_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kate_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kscreensaver_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/konsole_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libkonq-dev_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/konqueror_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase-dev_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/libkonq3_2.2.2-14.7_powerpc.deb stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.7_powerpc.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-mipsel/kdebase-libs_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdm_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kscreensaver_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kate_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libkonq3_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase-dev_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/konsole_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/libkonq-dev_2.2.2-14.7_mipsel.deb stable/main/binary-mipsel/konqueror_2.2.2-14.7_mipsel.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-mips/konsole_2.2.2-14.7_mips.deb stable/main/binary-mips/libkonq-dev_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-libs_2.2.2-14.7_mips.deb stable/main/binary-mips/kdm_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase_2.2.2-14.7_mips.deb stable/main/binary-mips/kate_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-dev_2.2.2-14.7_mips.deb stable/main/binary-mips/konqueror_2.2.2-14.7_mips.deb stable/main/binary-mips/kscreensaver_2.2.2-14.7_mips.deb stable/main/binary-mips/libkonq3_2.2.2-14.7_mips.deb stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.7_mips.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-m68k/konqueror_2.2.2-14.7_m68k.deb stable/main/binary-m68k/konsole_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-libs_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdm_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libkonq3_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kscreensaver_2.2.2-14.7_m68k.deb stable/main/binary-m68k/libkonq-dev_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-dev_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.7_m68k.deb stable/main/binary-m68k/kate_2.2.2-14.7_m68k.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-ia64/kate_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-dev_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdm_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kscreensaver_2.2.2-14.7_ia64.deb stable/main/binary-ia64/konsole_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libkonq3_2.2.2-14.7_ia64.deb stable/main/binary-ia64/libkonq-dev_2.2.2-14.7_ia64.deb stable/main/binary-ia64/kdebase-libs_2.2.2-14.7_ia64.deb stable/main/binary-ia64/konqueror_2.2.2-14.7_ia64.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-hppa/konqueror_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.7_hppa.deb stable/main/binary-hppa/konsole_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdm_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libkonq3_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kscreensaver_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kate_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-libs_2.2.2-14.7_hppa.deb stable/main/binary-hppa/kdebase-dev_2.2.2-14.7_hppa.deb stable/main/binary-hppa/libkonq-dev_2.2.2-14.7_hppa.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-arm/kscreensaver_2.2.2-14.7_arm.deb stable/main/binary-arm/kdm_2.2.2-14.7_arm.deb stable/main/binary-arm/libkonq-dev_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase_2.2.2-14.7_arm.deb stable/main/binary-arm/konsole_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.7_arm.deb stable/main/binary-arm/libkonq3_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-libs_2.2.2-14.7_arm.deb stable/main/binary-arm/konqueror_2.2.2-14.7_arm.deb stable/main/binary-arm/kate_2.2.2-14.7_arm.deb stable/main/binary-arm/kdebase-dev_2.2.2-14.7_arm.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-alpha/kdebase-dev_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kate_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libkonq-dev_2.2.2-14.7_alpha.deb stable/main/binary-alpha/libkonq3_2.2.2-14.7_alpha.deb stable/main/binary-alpha/konsole_2.2.2-14.7_alpha.deb stable/main/binary-alpha/konqueror_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kscreensaver_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdebase-libs_2.2.2-14.7_alpha.deb stable/main/binary-alpha/kdm_2.2.2-14.7_alpha.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/source/kdebase_2.2.2-14.7.dsc stable/main/binary-i386/konqueror_2.2.2-14.7_i386.deb stable/main/binary-i386/kscreensaver_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-libs_2.2.2-14.7_i386.deb stable/main/binary-i386/libkonq-dev_2.2.2-14.7_i386.deb stable/main/binary-i386/konsole_2.2.2-14.7_i386.deb stable/main/source/kdebase_2.2.2-14.7.diff.gz stable/main/binary-i386/kdebase_2.2.2-14.7_i386.deb stable/main/binary-i386/kdm_2.2.2-14.7_i386.deb stable/main/binary-all/kdebase-doc_2.2.2-14.7_all.deb stable/main/binary-i386/kate_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-dev_2.2.2-14.7_i386.deb stable/main/binary-i386/libkonq3_2.2.2-14.7_i386.deb stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.7_i386.deb stable/main/binary-all/kdewallpapers_2.2.2-14.7_all.deb kdebase (4:2.2.2-14.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Updated patch from KDE advisory 20030916 stable/main/binary-sparc/jnethack_1.1.5-11woody2_sparc.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-s390/jnethack_1.1.5-11woody2_s390.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-powerpc/jnethack_1.1.5-11woody2_powerpc.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-mipsel/jnethack_1.1.5-11woody2_mipsel.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-mips/jnethack_1.1.5-11woody2_mips.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-m68k/jnethack_1.1.5-11woody2_m68k.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-ia64/jnethack_1.1.5-11woody2_ia64.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-hppa/jnethack_1.1.5-11woody2_hppa.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-arm/jnethack_1.1.5-11woody2_arm.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-alpha/jnethack_1.1.5-11woody2_alpha.deb jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-i386/jnethack_1.1.5-11woody2_i386.deb stable/main/source/jnethack_1.1.5-11woody2.dsc stable/main/source/jnethack_1.1.5-11woody2.diff.gz jnethack (1.1.5-11woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates, which fixes CAN-2003-0359 and CAN-2003-0358 stable/main/binary-sparc/jigdo-file_0.6.5-2_sparc.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-s390/jigdo-file_0.6.5-2_s390.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-powerpc/jigdo-file_0.6.5-2_powerpc.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-mipsel/jigdo-file_0.6.5-2_mipsel.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-mips/jigdo-file_0.6.5-2_mips.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-m68k/jigdo-file_0.6.5-2_m68k.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-ia64/jigdo-file_0.6.5-2_ia64.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-hppa/jigdo-file_0.6.5-2_hppa.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-arm/jigdo-file_0.6.5-2_arm.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-alpha/jigdo-file_0.6.5-2_alpha.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/source/jigdo_0.6.5-2.dsc stable/main/source/jigdo_0.6.5-2.diff.gz stable/main/binary-i386/jigdo-file_0.6.5-2_i386.deb jigdo (0.6.5-2) stable; urgency=low * Backported some changes from 0.6.8 to stable: * Relative template URLs allowed, closes: #149885 * jigdo-lite/mirror use "jigdo-file --no-cache" when reading downloaded files from tmp dir, closes: #150973 stable/main/binary-s390/bitchx-gtk_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx-ssl_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx-dev_1.0-0c19-1.1_s390.deb stable/main/binary-s390/bitchx_1.0-0c19-1.1_s390.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-powerpc/bitchx-gtk_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx-ssl_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx-dev_1.0-0c19-1.1_powerpc.deb stable/main/binary-powerpc/bitchx_1.0-0c19-1.1_powerpc.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-mipsel/bitchx-dev_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx-gtk_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx_1.0-0c19-1.1_mipsel.deb stable/main/binary-mipsel/bitchx-ssl_1.0-0c19-1.1_mipsel.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-mips/bitchx-gtk_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx-dev_1.0-0c19-1.1_mips.deb stable/main/binary-mips/bitchx-ssl_1.0-0c19-1.1_mips.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-m68k/bitchx_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-gtk_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-ssl_1.0-0c19-1.1_m68k.deb stable/main/binary-m68k/bitchx-dev_1.0-0c19-1.1_m68k.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-ia64/bitchx_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-ssl_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-dev_1.0-0c19-1.1_ia64.deb stable/main/binary-ia64/bitchx-gtk_1.0-0c19-1.1_ia64.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-i386/bitchx-ssl_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx-dev_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx_1.0-0c19-1.1_i386.deb stable/main/binary-i386/bitchx-gtk_1.0-0c19-1.1_i386.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-hppa/bitchx-gtk_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx-dev_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx-ssl_1.0-0c19-1.1_hppa.deb stable/main/binary-hppa/bitchx_1.0-0c19-1.1_hppa.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-arm/bitchx_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-ssl_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-dev_1.0-0c19-1.1_arm.deb stable/main/binary-arm/bitchx-gtk_1.0-0c19-1.1_arm.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-alpha/bitchx-ssl_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx-gtk_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx_1.0-0c19-1.1_alpha.deb stable/main/binary-alpha/bitchx-dev_1.0-0c19-1.1_alpha.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-sparc/bitchx-ssl_1.0-0c19-1.1_sparc.deb stable/main/source/ircii-pana_1.0-0c19-1.1.diff.gz stable/main/binary-sparc/bitchx-gtk_1.0-0c19-1.1_sparc.deb stable/main/binary-sparc/bitchx-dev_1.0-0c19-1.1_sparc.deb stable/main/source/ircii-pana_1.0-0c19-1.1.dsc stable/main/binary-sparc/bitchx_1.0-0c19-1.1_sparc.deb ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by caf@guarana.org to fix problems reported by Timo Sirainen stable/main/binary-all/ipmasq_3.5.10c_all.deb stable/main/source/ipmasq_3.5.10c.dsc stable/main/source/ipmasq_3.5.10c.tar.gz ipmasq (3.5.10c) stable-security; urgency=high * Non-maintainer upload by the Security Team * Note that the issue fixed in 3.5.10b is CAN-2003-0785 stable/main/binary-all/xfonts-intl-european_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-chinese_1.2.1-0.woody.1_all.deb stable/main/source/intlfonts_1.2.1-0.woody.1.diff.gz stable/main/binary-all/xfonts-intl-asian_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-phonetic_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-japanese_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-arabic_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-chinese-big_1.2.1-0.woody.1_all.deb stable/main/binary-all/xfonts-intl-japanese-big_1.2.1-0.woody.1_all.deb stable/main/source/intlfonts_1.2.1-0.woody.1.dsc intlfonts (1.2.1-0.woody.1) stable; urgency=high * New upstream release, backported to woody. It fixes the licensing problem with Japanese big fonts that we are not allowed to distribute. stable/main/source/imp_2.2.6-5.2.dsc stable/main/source/imp_2.2.6-5.2.diff.gz stable/main/binary-all/imp_2.2.6-5.2_all.deb imp (3:2.2.6-5.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Small correction for db.pgsql stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/imagemagick_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/perlmagick_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick5_5.4.4.5-1woody1_sparc.deb stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody1_sparc.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick++5_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/libmagick5_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/perlmagick_5.4.4.5-1woody1_s390.deb stable/main/binary-s390/imagemagick_5.4.4.5-1woody1_s390.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody1_powerpc.deb stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody1_powerpc.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody1_mipsel.deb stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody1_mipsel.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick5_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/perlmagick_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/imagemagick_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody1_mips.deb stable/main/binary-mips/libmagick++5_5.4.4.5-1woody1_mips.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-m68k/imagemagick_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/libmagick5_5.4.4.5-1woody1_m68k.deb stable/main/binary-m68k/perlmagick_5.4.4.5-1woody1_m68k.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/imagemagick_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/perlmagick_5.4.4.5-1woody1_ia64.deb stable/main/binary-ia64/libmagick5_5.4.4.5-1woody1_ia64.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-hppa/perlmagick_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick5_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody1_hppa.deb stable/main/binary-hppa/imagemagick_5.4.4.5-1woody1_hppa.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick5_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/perlmagick_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/libmagick++5_5.4.4.5-1woody1_arm.deb stable/main/binary-arm/imagemagick_5.4.4.5-1woody1_arm.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/perlmagick_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/imagemagick_5.4.4.5-1woody1_alpha.deb stable/main/binary-alpha/libmagick5_5.4.4.5-1woody1_alpha.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/source/imagemagick_5.4.4.5-1woody1.diff.gz stable/main/binary-i386/perlmagick_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick++5_5.4.4.5-1woody1_i386.deb stable/main/source/imagemagick_5.4.4.5-1woody1.dsc stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick5_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody1_i386.deb stable/main/binary-i386/imagemagick_5.4.4.5-1woody1_i386.deb imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Daniel Kobras to fix insecure temporary file creation (CAN-2003-0455) stable/main/binary-ia64/illuminator-demo_0.3.2-1.woody.2_ia64.deb stable/main/binary-ia64/illuminator0_0.3.2-1.woody.2_ia64.deb stable/main/binary-ia64/illuminator-dev_0.3.2-1.woody.2_ia64.deb illuminator (0.3.2-1.woody.2) testing; urgency=low * D'OH! Forgot to set the distribution to "testing" before upload... stable/main/binary-s390/hypermail_2.1.3-2.0_s390.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-powerpc/hypermail_2.1.3-2.0_powerpc.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-mipsel/hypermail_2.1.3-2.0_mipsel.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-mips/hypermail_2.1.3-2.0_mips.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-m68k/hypermail_2.1.3-2.0_m68k.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-ia64/hypermail_2.1.3-2.0_ia64.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-i386/hypermail_2.1.3-2.0_i386.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-hppa/hypermail_2.1.3-2.0_hppa.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-arm/hypermail_2.1.3-2.0_arm.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-alpha/hypermail_2.1.3-2.0_alpha.deb hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-sparc/hypermail_2.1.3-2.0_sparc.deb stable/main/source/hypermail_2.1.3-2.0.dsc stable/main/source/hypermail_2.1.3-2.0.diff.gz hypermail (2.1.3-2.0) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when progress = 2 and a long attachment filename (upstream) * Fixed broken use of mkstemp() in parse.c that could potentially crash hypermail * Backported additional buffer overflow checks from upstream * Fix possible buffer overflow with long hostname (upstream) * Moved the build of hypermail back to the build target stable/main/binary-sparc/hylafax-client_4.1.1-3_sparc.deb stable/main/binary-sparc/hylafax-server_4.1.1-3_sparc.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-s390/hylafax-server_4.1.1-3_s390.deb stable/main/binary-s390/hylafax-client_4.1.1-3_s390.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-m68k/hylafax-client_4.1.1-3_m68k.deb stable/main/binary-m68k/hylafax-server_4.1.1-3_m68k.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-ia64/hylafax-server_4.1.1-3_ia64.deb stable/main/binary-ia64/hylafax-client_4.1.1-3_ia64.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-i386/hylafax-client_4.1.1-3_i386.deb stable/main/binary-i386/hylafax-server_4.1.1-3_i386.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-hppa/hylafax-server_4.1.1-3_hppa.deb stable/main/binary-hppa/hylafax-client_4.1.1-3_hppa.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-arm/hylafax-server_4.1.1-3_arm.deb stable/main/binary-arm/hylafax-client_4.1.1-3_arm.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-alpha/hylafax-server_4.1.1-3_alpha.deb stable/main/binary-alpha/hylafax-client_4.1.1-3_alpha.deb hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/source/hylafax_4.1.1-3.dsc stable/main/binary-powerpc/hylafax-server_4.1.1-3_powerpc.deb stable/main/binary-all/hylafax-doc_4.1.1-3_all.deb stable/main/binary-powerpc/hylafax-client_4.1.1-3_powerpc.deb stable/main/source/hylafax_4.1.1-3.diff.gz hylafax (1:4.1.1-3) stable-security; urgency=high * Backport from the 4.1.8 security release that fixes a remotely exploitable format string vulnerability in hfaxd that could be present in certain non-default configurations. (CAN-2003-0886) stable/main/binary-sparc/gzip_1.3.2-3woody1_sparc.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-s390/gzip_1.3.2-3woody1_s390.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-powerpc/gzip_1.3.2-3woody1_powerpc.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-mipsel/gzip_1.3.2-3woody1_mipsel.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-mips/gzip_1.3.2-3woody1_mips.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-m68k/gzip_1.3.2-3woody1_m68k.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-ia64/gzip_1.3.2-3woody1_ia64.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-hppa/gzip_1.3.2-3woody1_hppa.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-arm/gzip_1.3.2-3woody1_arm.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/binary-alpha/gzip_1.3.2-3woody1_alpha.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/source/gzip_1.3.2-3woody1.dsc stable/main/source/gzip_1.3.2-3woody1.diff.gz stable/main/binary-i386/gzip_1.3.2-3woody1_i386.deb gzip (1.3.2-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix multiple instances of insecure temporary files - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato - znew (CAN-2003-0367) stable/main/source/gs-common_0.3.3.0woody1.tar.gz stable/main/binary-all/gs-common_0.3.3.0woody1_all.deb stable/main/source/gs-common_0.3.3.0woody1.dsc gs-common (0.3.3.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch ps2epsi to create a temporary file securely using tempfile stable/main/binary-sparc/gopher_3.0.3woody1_sparc.deb stable/main/binary-sparc/gopherd_3.0.3woody1_sparc.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-s390/gopher_3.0.3woody1_s390.deb stable/main/binary-s390/gopherd_3.0.3woody1_s390.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-powerpc/gopher_3.0.3woody1_powerpc.deb stable/main/binary-powerpc/gopherd_3.0.3woody1_powerpc.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-mipsel/gopherd_3.0.3woody1_mipsel.deb stable/main/binary-mipsel/gopher_3.0.3woody1_mipsel.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-mips/gopher_3.0.3woody1_mips.deb stable/main/binary-mips/gopherd_3.0.3woody1_mips.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-m68k/gopherd_3.0.3woody1_m68k.deb stable/main/binary-m68k/gopher_3.0.3woody1_m68k.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-ia64/gopherd_3.0.3woody1_ia64.deb stable/main/binary-ia64/gopher_3.0.3woody1_ia64.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-hppa/gopher_3.0.3woody1_hppa.deb stable/main/binary-hppa/gopherd_3.0.3woody1_hppa.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-arm/gopherd_3.0.3woody1_arm.deb stable/main/binary-arm/gopher_3.0.3woody1_arm.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-alpha/gopherd_3.0.3woody1_alpha.deb stable/main/binary-alpha/gopher_3.0.3woody1_alpha.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/source/gopher_3.0.3woody1.dsc stable/main/source/gopher_3.0.3woody1.tar.gz stable/main/binary-i386/gopherd_3.0.3woody1_i386.deb stable/main/binary-i386/gopher_3.0.3woody1_i386.deb gopher (3.0.3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple buffer overflows in FTP handling code and authentication code. (CAN-2003-0805) stable/main/binary-sparc/gnupg_1.0.6-4_sparc.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-s390/gnupg_1.0.6-4_s390.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-powerpc/gnupg_1.0.6-4_powerpc.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-mipsel/gnupg_1.0.6-4_mipsel.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-mips/gnupg_1.0.6-4_mips.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-m68k/gnupg_1.0.6-4_m68k.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-ia64/gnupg_1.0.6-4_ia64.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-hppa/gnupg_1.0.6-4_hppa.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-arm/gnupg_1.0.6-4_arm.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-alpha/gnupg_1.0.6-4_alpha.deb gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/source/gnupg_1.0.6-4.dsc stable/main/binary-i386/gnupg_1.0.6-4_i386.deb stable/main/source/gnupg_1.0.6-4.diff.gz gnupg (1.0.6-4) stable; urgency=high * g10/parse-packet.c (parse_trust): Patch from Werner to fix compatability with keyrings written to by 1.0.7 and later. * cipher/random.c (add_randomness): Security fix from Werner. stable/main/binary-sparc/gnocatan-server_0.6.1-5woody2_sparc.deb stable/main/binary-sparc/gnocatan-client_0.6.1-5woody2_sparc.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-s390/gnocatan-server_0.6.1-5woody2_s390.deb stable/main/binary-s390/gnocatan-client_0.6.1-5woody2_s390.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-powerpc/gnocatan-server_0.6.1-5woody2_powerpc.deb stable/main/binary-powerpc/gnocatan-client_0.6.1-5woody2_powerpc.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-mipsel/gnocatan-client_0.6.1-5woody2_mipsel.deb stable/main/binary-mipsel/gnocatan-server_0.6.1-5woody2_mipsel.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-mips/gnocatan-server_0.6.1-5woody2_mips.deb stable/main/binary-mips/gnocatan-client_0.6.1-5woody2_mips.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-m68k/gnocatan-server_0.6.1-5woody2_m68k.deb stable/main/binary-m68k/gnocatan-client_0.6.1-5woody2_m68k.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-ia64/gnocatan-client_0.6.1-5woody2_ia64.deb stable/main/binary-ia64/gnocatan-server_0.6.1-5woody2_ia64.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-arm/gnocatan-server_0.6.1-5woody2_arm.deb stable/main/binary-arm/gnocatan-client_0.6.1-5woody2_arm.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-alpha/gnocatan-server_0.6.1-5woody2_alpha.deb stable/main/binary-alpha/gnocatan-client_0.6.1-5woody2_alpha.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-i386/gnocatan-client_0.6.1-5woody2_i386.deb stable/main/source/gnocatan_0.6.1-5woody2.dsc stable/main/binary-all/gnocatan-help_0.6.1-5woody2_all.deb stable/main/binary-all/gnocatan-data_0.6.1-5woody2_all.deb stable/main/source/gnocatan_0.6.1-5woody2.diff.gz stable/main/binary-i386/gnocatan-server_0.6.1-5woody2_i386.deb gnocatan (0.6.1-5woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips * Fix line/str/offset mixup buglet [common/state.c] stable/main/binary-sparc/libc6-sparc64_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-prof_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dev_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-pic_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.5_sparc.deb stable/main/binary-sparc/libc6-dbg_2.2.5-11.5_sparc.deb stable/main/binary-sparc/nscd_2.2.5-11.5_sparc.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-s390/libc6-pic_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-dbg_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-prof_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6_2.2.5-11.5_s390.deb stable/main/binary-s390/nscd_2.2.5-11.5_s390.deb stable/main/binary-s390/libc6-dev_2.2.5-11.5_s390.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-powerpc/libc6-dev_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/nscd_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.2.5-11.5_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.2.5-11.5_powerpc.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-mipsel/nscd_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.2.5-11.5_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.2.5-11.5_mipsel.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-mips/nscd_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-dev_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-pic_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-prof_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6-dbg_2.2.5-11.5_mips.deb stable/main/binary-mips/libc6_2.2.5-11.5_mips.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-ia64/libc6.1-pic_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.2.5-11.5_ia64.deb stable/main/binary-ia64/libc6.1_2.2.5-11.5_ia64.deb stable/main/binary-ia64/nscd_2.2.5-11.5_ia64.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-i386/libc6-dbg_2.2.5-11.5_i386.deb stable/main/binary-i386/nscd_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-pic_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-dev_2.2.5-11.5_i386.deb stable/main/binary-i386/libc6-prof_2.2.5-11.5_i386.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-hppa/libc6-prof_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-dbg_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-pic_2.2.5-11.5_hppa.deb stable/main/binary-hppa/nscd_2.2.5-11.5_hppa.deb stable/main/binary-hppa/libc6-dev_2.2.5-11.5_hppa.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-arm/libc6-prof_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-dev_2.2.5-11.5_arm.deb stable/main/binary-arm/nscd_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-dbg_2.2.5-11.5_arm.deb stable/main/binary-arm/libc6-pic_2.2.5-11.5_arm.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.2.5-11.5_alpha.deb stable/main/binary-alpha/nscd_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.2.5-11.5_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.2.5-11.5_alpha.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/binary-m68k/libc6-dev_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-prof_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-pic_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6_2.2.5-11.5_m68k.deb stable/main/binary-m68k/libc6-dbg_2.2.5-11.5_m68k.deb stable/main/binary-m68k/nscd_2.2.5-11.5_m68k.deb stable/main/binary-all/locales_2.2.5-11.5_all.deb stable/main/source/glibc_2.2.5-11.5.dsc stable/main/source/glibc_2.2.5-11.5.diff.gz stable/main/binary-all/glibc-doc_2.2.5-11.5_all.deb glibc (2.2.5-11.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Adjusted build dependencies once more, didn't know that I must not use a comma as separator, never fiddled with build-deps that much before. *sigh* stable/main/source/gallery_1.2.5-8woody1.dsc stable/main/source/gallery_1.2.5-8woody1.diff.gz stable/main/binary-all/gallery_1.2.5-8woody1_all.deb gallery (1.2.5-8woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix cross-site scripting in searchstring parameter (CAN-2003-0614) [search.php] stable/main/binary-sparc/fuzz_0.6-6woody1_sparc.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-s390/fuzz_0.6-6woody1_s390.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-powerpc/fuzz_0.6-6woody1_powerpc.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-mipsel/fuzz_0.6-6woody1_mipsel.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-mips/fuzz_0.6-6woody1_mips.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-m68k/fuzz_0.6-6woody1_m68k.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-ia64/fuzz_0.6-6woody1_ia64.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-hppa/fuzz_0.6-6woody1_hppa.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-arm/fuzz_0.6-6woody1_arm.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-alpha/fuzz_0.6-6woody1_alpha.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/source/fuzz_0.6-6woody1.diff.gz stable/main/source/fuzz_0.6-6woody1.dsc stable/main/binary-i386/fuzz_0.6-6woody1_i386.deb fuzz (0.6-6woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Create temporary file securely using mkstemp (bug #183047) stable/main/binary-alpha/ftape-util_1.09.2001.08.13-0.3_alpha.deb ftape-tools (1:1.09.2001.08.13-0.3) unstable; urgency=low * Non-maintainer upload. * debian/control: Added `texinfo' to build dependencies. Closes: Bug#133562. stable/main/binary-sparc/file_3.37-3.1.woody.1_sparc.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-s390/file_3.37-3.1.woody.1_s390.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-powerpc/file_3.37-3.1.woody.1_powerpc.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-mipsel/file_3.37-3.1.woody.1_mipsel.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-mips/file_3.37-3.1.woody.1_mips.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-m68k/file_3.37-3.1.woody.1_m68k.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-ia64/file_3.37-3.1.woody.1_ia64.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-i386/file_3.37-3.1.woody.1_i386.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-hppa/file_3.37-3.1.woody.1_hppa.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-arm/file_3.37-3.1.woody.1_arm.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-alpha/file_3.37-3.1.woody.1_alpha.deb file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/source/file_3.37-3.1.woody.1.dsc stable/main/source/file_3.37-3.1.woody.1.diff.gz file (3.37-3.1.woody.1) stable; urgency=high * [SECURITY] fix buffer overflow in readelf.c stable/main/binary-s390/fetchmail-ssl_5.9.11-6.2_s390.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.2_powerpc.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.2_mipsel.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mips/fetchmail-ssl_5.9.11-6.2_mips.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.2_m68k.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.2_ia64.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-i386/fetchmail-ssl_5.9.11-6.2_i386.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.2_hppa.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-arm/fetchmail-ssl_5.9.11-6.2_arm.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.2_alpha.deb fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.2_sparc.deb stable/main/source/fetchmail-ssl_5.9.11-6.2.dsc stable/main/source/fetchmail-ssl_5.9.11-6.2.diff.gz fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-s390/fetchmail_5.9.11-6.2_s390.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-powerpc/fetchmail_5.9.11-6.2_powerpc.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mipsel/fetchmail_5.9.11-6.2_mipsel.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-mips/fetchmail_5.9.11-6.2_mips.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-m68k/fetchmail_5.9.11-6.2_m68k.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-ia64/fetchmail_5.9.11-6.2_ia64.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-i386/fetchmail_5.9.11-6.2_i386.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-hppa/fetchmail_5.9.11-6.2_hppa.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-arm/fetchmail_5.9.11-6.2_arm.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-alpha/fetchmail_5.9.11-6.2_alpha.deb fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/source/fetchmail_5.9.11-6.2.diff.gz stable/main/binary-all/fetchmailconf_5.9.11-6.2_all.deb stable/main/binary-sparc/fetchmail_5.9.11-6.2_sparc.deb stable/main/binary-all/fetchmail-common_5.9.11-6.2_all.deb stable/main/source/fetchmail_5.9.11-6.2.dsc fetchmail (5.9.11-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365) stable/main/binary-sparc/fdclone_2.00a-1woody3_sparc.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-s390/fdclone_2.00a-1woody3_s390.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-powerpc/fdclone_2.00a-1woody3_powerpc.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-m68k/fdclone_2.00a-1woody3_m68k.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-hppa/fdclone_2.00a-1woody3_hppa.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-arm/fdclone_2.00a-1woody3_arm.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-alpha/fdclone_2.00a-1woody3_alpha.deb fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/source/fdclone_2.00a-1woody3.dsc stable/main/binary-i386/fdclone_2.00a-1woody3_i386.deb stable/main/source/fdclone_2.00a-1woody3.diff.gz fdclone (2.00a-1woody3) stable-security; urgency=high * use random number instead of PID number for temporary directory * do check existence of the temporary directory * Closes: #182619 * CAN-2003-0596 stable/main/binary-sparc/falconseye_1.9.3-7woody3_sparc.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-s390/falconseye_1.9.3-7woody3_s390.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-powerpc/falconseye_1.9.3-7woody3_powerpc.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-mipsel/falconseye_1.9.3-7woody3_mipsel.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-mips/falconseye_1.9.3-7woody3_mips.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-m68k/falconseye_1.9.3-7woody3_m68k.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-ia64/falconseye_1.9.3-7woody3_ia64.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-hppa/falconseye_1.9.3-7woody3_hppa.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-arm/falconseye_1.9.3-7woody3_arm.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-alpha/falconseye_1.9.3-7woody3_alpha.deb falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/source/falconseye_1.9.3-7woody3.dsc stable/main/binary-i386/falconseye_1.9.3-7woody3_i386.deb stable/main/binary-all/falconseye-data_1.9.3-7woody3_all.deb stable/main/source/falconseye_1.9.3-7woody3.diff.gz falconseye (1.9.3-7woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Re-target package from proposed-updates for stable-security * This fixed CAN-2003-0358 stable/main/binary-sparc/eximon_3.35-1woody2_sparc.deb stable/main/binary-sparc/exim_3.35-1woody2_sparc.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-s390/eximon_3.35-1woody2_s390.deb stable/main/binary-s390/exim_3.35-1woody2_s390.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-powerpc/eximon_3.35-1woody2_powerpc.deb stable/main/binary-powerpc/exim_3.35-1woody2_powerpc.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-mipsel/exim_3.35-1woody2_mipsel.deb stable/main/binary-mipsel/eximon_3.35-1woody2_mipsel.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-mips/eximon_3.35-1woody2_mips.deb stable/main/binary-mips/exim_3.35-1woody2_mips.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-m68k/exim_3.35-1woody2_m68k.deb stable/main/binary-m68k/eximon_3.35-1woody2_m68k.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-ia64/exim_3.35-1woody2_ia64.deb stable/main/binary-ia64/eximon_3.35-1woody2_ia64.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-hppa/eximon_3.35-1woody2_hppa.deb stable/main/binary-hppa/exim_3.35-1woody2_hppa.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-arm/exim_3.35-1woody2_arm.deb stable/main/binary-arm/eximon_3.35-1woody2_arm.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-alpha/exim_3.35-1woody2_alpha.deb stable/main/binary-alpha/eximon_3.35-1woody2_alpha.deb exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/source/exim_3.35-1woody2.diff.gz stable/main/binary-i386/exim_3.35-1woody2_i386.deb stable/main/binary-i386/eximon_3.35-1woody2_i386.deb stable/main/source/exim_3.35-1woody2.dsc exim (3.35-1woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix debian/rules to explicitly set permissions on installed documentation (including man pages) stable/main/binary-sparc/ethereal-dev_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/ethereal_0.9.4-1woody5_sparc.deb stable/main/binary-sparc/tethereal_0.9.4-1woody5_sparc.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-s390/tethereal_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody5_s390.deb stable/main/binary-s390/ethereal-common_0.9.4-1woody5_s390.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/ethereal_0.9.4-1woody5_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody5_powerpc.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-mipsel/tethereal_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.9.4-1woody5_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody5_mipsel.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-mips/ethereal-dev_0.9.4-1woody5_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody5_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody5_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody5_mips.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-m68k/ethereal_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/ethereal-dev_0.9.4-1woody5_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody5_m68k.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-ia64/tethereal_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody5_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody5_ia64.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-hppa/ethereal-dev_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/ethereal-common_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody5_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody5_hppa.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-arm/ethereal-common_0.9.4-1woody5_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody5_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody5_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody5_arm.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-alpha/tethereal_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody5_alpha.deb stable/main/binary-alpha/ethereal-dev_0.9.4-1woody5_alpha.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-i386/ethereal-common_0.9.4-1woody5_i386.deb stable/main/source/ethereal_0.9.4-1woody5.diff.gz stable/main/binary-i386/ethereal_0.9.4-1woody5_i386.deb stable/main/source/ethereal_0.9.4-1woody5.dsc stable/main/binary-i386/tethereal_0.9.4-1woody5_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody5_i386.deb ethereal (0.9.4-1woody5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix vulnerabilities announced in enpa-sa-00010 - throw an error on zero-length bufsize in tvb_get_nstringz0 (CAN-2003-0431) [epan/tvbuff.c] - Fix over-allocation problem in DCERPC dissector (CAN-2003-0428) [packet-dcerpc-lsa.c] - Fix overflow with bad IPv4 or IPv6 prefix lengths (CAN-2003-0429) [packet-isis-lsp.c] - Use a slightly larger buffer in print_tsap (CAN-2003-0432) [packet-clnp.c] - Check snprintf return value correctly (CAN-2003-0432) [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c] - Fix buffer overflows on szInfo buffer (CAN-2003-0432) [packet-wtp.c] - Use consistent buffer size for valString (CAN-2003-0432) [packet-wsp.c] - Use a GString to avoid all sorts of dangerous buffer handling with strcat, sprintf, strncpy (CAN-2003-0432) [packet-isis-clv.c, packet-dns.c, packet-bgp.c] stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.2_sparc.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-s390/eterm_0.9.2-0pre2002042903.2_s390.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.2_powerpc.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.2_mipsel.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-mips/eterm_0.9.2-0pre2002042903.2_mips.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.2_m68k.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.2_ia64.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.2_hppa.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-arm/eterm_0.9.2-0pre2002042903.2_arm.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.2_alpha.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/source/eterm_0.9.2-0pre2002042903.2.tar.gz stable/main/source/eterm_0.9.2-0pre2002042903.2.dsc stable/main/binary-i386/eterm_0.9.2-0pre2002042903.2_i386.deb eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a semantic error in the snprintf invocation introduced in the previous version stable/main/binary-all/eroaster_2.1.0.0.3-2woody1_all.deb stable/main/source/eroaster_2.1.0.0.3-2woody1.dsc stable/main/source/eroaster_2.1.0.0.3-2woody1.diff.gz eroaster (2.1.0.0.3-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Patch from maintainer to use a temporary file under $HOME, rather than in /tmp (CAN-2003-0656) stable/main/binary-sparc/epic4_1.1.2.20020219-2.2_sparc.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-s390/epic4_1.1.2.20020219-2.2_s390.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-powerpc/epic4_1.1.2.20020219-2.2_powerpc.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-mipsel/epic4_1.1.2.20020219-2.2_mipsel.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-mips/epic4_1.1.2.20020219-2.2_mips.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-m68k/epic4_1.1.2.20020219-2.2_m68k.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-ia64/epic4_1.1.2.20020219-2.2_ia64.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-i386/epic4_1.1.2.20020219-2.2_i386.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-hppa/epic4_1.1.2.20020219-2.2_hppa.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-arm/epic4_1.1.2.20020219-2.2_arm.deb epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-alpha/epic4_1.1.2.20020219-2.2_alpha.deb stable/main/source/epic4_1.1.2.20020219-2.2.dsc stable/main/source/epic4_1.1.2.20020219-2.2.diff.gz epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Jeremy Nelson to fix buffer overflow (source/ctcp.c, ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1) stable/main/binary-s390/epic_3.004-17.1_s390.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-powerpc/epic_3.004-17.1_powerpc.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-mipsel/epic_3.004-17.1_mipsel.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-mips/epic_3.004-17.1_mips.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-m68k/epic_3.004-17.1_m68k.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-ia64/epic_3.004-17.1_ia64.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-i386/epic_3.004-17.1_i386.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-hppa/epic_3.004-17.1_hppa.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-arm/epic_3.004-17.1_arm.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-alpha/epic_3.004-17.1_alpha.deb epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/binary-sparc/epic_3.004-17.1_sparc.deb stable/main/source/epic_3.004-17.1.dsc stable/main/source/epic_3.004-17.1.diff.gz epic (3.004-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream ircII patch partially to fix problems reported by Timo Sirainen * Added build dependencies stable/main/source/eldav_0.0.20020411-1woody1.diff.gz stable/main/binary-all/eldav_0.0.20020411-1woody1_all.deb stable/main/source/eldav_0.0.20020411-1woody1.dsc eldav (0.0.20020411-1woody1) stable-security; urgency=high * fix insecure tempfile handling (CAN-2003-0438) * backport make-temp-file from apel-10.5/poe.el stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_s390.deb stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.1_s390.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_powerpc.deb stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.1_powerpc.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.1_mipsel.deb stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mipsel.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.1_mips.deb stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mips.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_m68k.deb stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.1_m68k.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.1_ia64.deb stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_ia64.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_i386.deb stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.1_i386.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_hppa.deb stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.1_hppa.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_arm.deb stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.1_arm.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_alpha.deb stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.1_alpha.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.diff.gz stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.1_sparc.deb stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.dsc stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_sparc.deb ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc] Apply fixes from ecartis CVS to fix password change vulnerability (#182786) stable/main/binary-arm/dwww_1.7.6.woody.1_arm.deb stable/main/binary-arm/realpath_1.7.6.woody.1_arm.deb dwww (1.7.6.woody.1) woody-proposed-updates; urgency=low * Upload to woody, no changes in source. The current dwww version in woody is 1.7.4, but I'd like to see 1.7.6 there: it has fixed a few of bugs and no new bug has been reported for 6 weeks. So it really is worth including in woody, I think. stable/main/binary-powerpc/dietlibc-dev_0.12-2.5_powerpc.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-mipsel/dietlibc-dev_0.12-2.5_mipsel.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-mips/dietlibc-dev_0.12-2.5_mips.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-i386/dietlibc-dev_0.12-2.5_i386.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-arm/dietlibc-dev_0.12-2.5_arm.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-alpha/dietlibc-dev_0.12-2.5_alpha.deb dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/source/dietlibc_0.12-2.5.diff.gz stable/main/binary-sparc/dietlibc-dev_0.12-2.5_sparc.deb stable/main/binary-all/dietlibc-doc_0.12-2.5_all.deb stable/main/source/dietlibc_0.12-2.5.dsc dietlibc (0.12-2.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added upstream patch to fix integer overflows in XDR RPC library (CAN-2003-0028) stable/main/binary-s390/dhcp3-dev_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-server_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-relay_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-common_3.0+3.0.1rc9-2.2_s390.deb stable/main/binary-s390/dhcp3-client_3.0+3.0.1rc9-2.2_s390.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-powerpc/dhcp3-common_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-client_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-relay_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-server_3.0+3.0.1rc9-2.2_powerpc.deb stable/main/binary-powerpc/dhcp3-dev_3.0+3.0.1rc9-2.2_powerpc.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-mipsel/dhcp3-dev_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-server_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-relay_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-common_3.0+3.0.1rc9-2.2_mipsel.deb stable/main/binary-mipsel/dhcp3-client_3.0+3.0.1rc9-2.2_mipsel.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-mips/dhcp3-common_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-relay_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-server_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-dev_3.0+3.0.1rc9-2.2_mips.deb stable/main/binary-mips/dhcp3-client_3.0+3.0.1rc9-2.2_mips.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-m68k/dhcp3-server_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-relay_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-common_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-client_3.0+3.0.1rc9-2.2_m68k.deb stable/main/binary-m68k/dhcp3-dev_3.0+3.0.1rc9-2.2_m68k.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-ia64/dhcp3-dev_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-client_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-relay_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-common_3.0+3.0.1rc9-2.2_ia64.deb stable/main/binary-ia64/dhcp3-server_3.0+3.0.1rc9-2.2_ia64.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-i386/dhcp3-client_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-dev_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-server_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-relay_3.0+3.0.1rc9-2.2_i386.deb stable/main/binary-i386/dhcp3-common_3.0+3.0.1rc9-2.2_i386.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-hppa/dhcp3-dev_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-server_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-relay_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-common_3.0+3.0.1rc9-2.2_hppa.deb stable/main/binary-hppa/dhcp3-client_3.0+3.0.1rc9-2.2_hppa.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-arm/dhcp3-server_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-dev_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-relay_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-client_3.0+3.0.1rc9-2.2_arm.deb stable/main/binary-arm/dhcp3-common_3.0+3.0.1rc9-2.2_arm.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-alpha/dhcp3-server_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-relay_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-client_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-dev_3.0+3.0.1rc9-2.2_alpha.deb stable/main/binary-alpha/dhcp3-common_3.0+3.0.1rc9-2.2_alpha.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-sparc/dhcp3-relay_3.0+3.0.1rc9-2.2_sparc.deb stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.dsc stable/main/binary-sparc/dhcp3-server_3.0+3.0.1rc9-2.2_sparc.deb stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.diff.gz stable/main/binary-sparc/dhcp3-common_3.0+3.0.1rc9-2.2_sparc.deb stable/main/binary-sparc/dhcp3-dev_3.0+3.0.1rc9-2.2_sparc.deb stable/main/binary-sparc/dhcp3-client_3.0+3.0.1rc9-2.2_sparc.deb dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch from Florian Lohoff to prevent packet storm attack of the DHCP infrastructure after a malicious BOOTP packet. stable/main/binary-sparc/debianutils_1.16.2woody1_sparc.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-s390/debianutils_1.16.2woody1_s390.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-powerpc/debianutils_1.16.2woody1_powerpc.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-mipsel/debianutils_1.16.2woody1_mipsel.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-mips/debianutils_1.16.2woody1_mips.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-m68k/debianutils_1.16.2woody1_m68k.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-ia64/debianutils_1.16.2woody1_ia64.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-i386/debianutils_1.16.2woody1_i386.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-hppa/debianutils_1.16.2woody1_hppa.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-arm/debianutils_1.16.2woody1_arm.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/binary-alpha/debianutils_1.16.2woody1_alpha.deb debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/source/debianutils_1.16.2woody1.tar.gz stable/main/source/debianutils_1.16.2woody1.dsc debianutils (1.16.2woody1) stable; urgency=high * Backport of Ian Zimmerman's run-parts program output loss patch, which fixes zombie problem. closes: #184710. stable/main/source/ddskk_11.6.rel.0-2woody1.dsc stable/main/source/ddskk_11.6.rel.0-2woody1.diff.gz stable/main/binary-all/ddskk_11.6.rel.0-2woody1_all.deb ddskk (11.6.rel.0-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Takao Kawamura to create temporary files safely stable/main/binary-all/dbishell_0.8.9-2woody1_all.deb stable/main/source/dbishell_0.8.9-2woody1.diff.gz stable/main/source/dbishell_0.8.9-2woody1.dsc dbishell (0.8.9-2woody1) stable; urgency=low * work around xterm feature disabled in DSA 380-1 that we used. Without this change, we lose the ability to run inside xterms after DSA 380-1 is dealt with on a system. stable/main/binary-s390/cyrus-common_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-pop3d_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-admin_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-imapd_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-nntp_1.5.19-9.1_s390.deb stable/main/binary-s390/cyrus-dev_1.5.19-9.1_s390.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-powerpc/cyrus-dev_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-common_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-admin_1.5.19-9.1_powerpc.deb stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.1_powerpc.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-admin_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-dev_1.5.19-9.1_mipsel.deb stable/main/binary-mipsel/cyrus-common_1.5.19-9.1_mipsel.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-mips/cyrus-pop3d_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-dev_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-admin_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-imapd_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-common_1.5.19-9.1_mips.deb stable/main/binary-mips/cyrus-nntp_1.5.19-9.1_mips.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-m68k/cyrus-imapd_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-nntp_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-dev_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-admin_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.1_m68k.deb stable/main/binary-m68k/cyrus-common_1.5.19-9.1_m68k.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-ia64/cyrus-common_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-admin_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-dev_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-imapd_1.5.19-9.1_ia64.deb stable/main/binary-ia64/cyrus-nntp_1.5.19-9.1_ia64.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-i386/cyrus-nntp_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-common_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-dev_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-admin_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-pop3d_1.5.19-9.1_i386.deb stable/main/binary-i386/cyrus-imapd_1.5.19-9.1_i386.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-common_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-imapd_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-admin_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-nntp_1.5.19-9.1_hppa.deb stable/main/binary-hppa/cyrus-dev_1.5.19-9.1_hppa.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-arm/cyrus-nntp_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-common_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-dev_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-imapd_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-admin_1.5.19-9.1_arm.deb stable/main/binary-arm/cyrus-pop3d_1.5.19-9.1_arm.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-alpha/cyrus-admin_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-imapd_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-common_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-dev_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.1_alpha.deb stable/main/binary-alpha/cyrus-nntp_1.5.19-9.1_alpha.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-sparc/cyrus-nntp_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-admin_1.5.19-9.1_sparc.deb stable/main/source/cyrus-imapd_1.5.19-9.1.diff.gz stable/main/binary-sparc/cyrus-dev_1.5.19-9.1_sparc.deb stable/main/source/cyrus-imapd_1.5.19-9.1.dsc stable/main/binary-sparc/cyrus-common_1.5.19-9.1_sparc.deb stable/main/binary-sparc/cyrus-imapd_1.5.19-9.1_sparc.deb cyrus-imapd (1.5.19-9.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Timo Sirainen to fix pre-login buffer overflow (CAN-2002-0379) * Added --without-krb to configure options so the build doesn't stomp over missing Kerberos libraries stable/main/binary-s390/cvs_1.11.1p1debian-8.1_s390.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-powerpc/cvs_1.11.1p1debian-8.1_powerpc.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-mipsel/cvs_1.11.1p1debian-8.1_mipsel.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-mips/cvs_1.11.1p1debian-8.1_mips.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-m68k/cvs_1.11.1p1debian-8.1_m68k.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-ia64/cvs_1.11.1p1debian-8.1_ia64.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-i386/cvs_1.11.1p1debian-8.1_i386.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-hppa/cvs_1.11.1p1debian-8.1_hppa.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-arm/cvs_1.11.1p1debian-8.1_arm.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-alpha/cvs_1.11.1p1debian-8.1_alpha.deb cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/source/cvs_1.11.1p1debian-8.1.diff.gz stable/main/binary-sparc/cvs_1.11.1p1debian-8.1_sparc.deb stable/main/source/cvs_1.11.1p1debian-8.1.dsc cvs (1.11.1p1debian-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch from Stefan Esser to fix double-free problem stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys-client_1.1.14-5_sparc.deb stable/main/binary-sparc/libcupsys2_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.1.14-5_sparc.deb stable/main/binary-sparc/cupsys_1.1.14-5_sparc.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-s390/cupsys-pstoraster_1.1.14-5_s390.deb stable/main/binary-s390/cupsys-client_1.1.14-5_s390.deb stable/main/binary-s390/cupsys-bsd_1.1.14-5_s390.deb stable/main/binary-s390/libcupsys2_1.1.14-5_s390.deb stable/main/binary-s390/libcupsys2-dev_1.1.14-5_s390.deb stable/main/binary-s390/cupsys_1.1.14-5_s390.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-powerpc/libcupsys2_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.1.14-5_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5_powerpc.deb stable/main/binary-powerpc/cupsys_1.1.14-5_powerpc.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-mipsel/cupsys-bsd_1.1.14-5_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys_1.1.14-5_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.1.14-5_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.1.14-5_mipsel.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-mips/cupsys-pstoraster_1.1.14-5_mips.deb stable/main/binary-mips/cupsys-bsd_1.1.14-5_mips.deb stable/main/binary-mips/cupsys-client_1.1.14-5_mips.deb stable/main/binary-mips/libcupsys2-dev_1.1.14-5_mips.deb stable/main/binary-mips/libcupsys2_1.1.14-5_mips.deb stable/main/binary-mips/cupsys_1.1.14-5_mips.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-m68k/cupsys-client_1.1.14-5_m68k.deb stable/main/binary-m68k/libcupsys2_1.1.14-5_m68k.deb stable/main/binary-m68k/libcupsys2-dev_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys-bsd_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5_m68k.deb stable/main/binary-m68k/cupsys_1.1.14-5_m68k.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys-client_1.1.14-5_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.1.14-5_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.1.14-5_ia64.deb stable/main/binary-ia64/libcupsys2_1.1.14-5_ia64.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-hppa/libcupsys2_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-client_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.1.14-5_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.1.14-5_hppa.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-arm/libcupsys2_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-client_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-bsd_1.1.14-5_arm.deb stable/main/binary-arm/libcupsys2-dev_1.1.14-5_arm.deb stable/main/binary-arm/cupsys-pstoraster_1.1.14-5_arm.deb stable/main/binary-arm/cupsys_1.1.14-5_arm.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/binary-alpha/libcupsys2-dev_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-client_1.1.14-5_alpha.deb stable/main/binary-alpha/libcupsys2_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5_alpha.deb stable/main/binary-alpha/cupsys_1.1.14-5_alpha.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/source/cupsys_1.1.14-5.diff.gz stable/main/binary-i386/cupsys-bsd_1.1.14-5_i386.deb stable/main/binary-i386/cupsys_1.1.14-5_i386.deb stable/main/binary-i386/libcupsys2-dev_1.1.14-5_i386.deb stable/main/binary-i386/cupsys-client_1.1.14-5_i386.deb stable/main/source/cupsys_1.1.14-5.dsc stable/main/binary-i386/cupsys-pstoraster_1.1.14-5_i386.deb stable/main/binary-i386/libcupsys2_1.1.14-5_i386.deb cupsys (1.1.14-5) stable-security; urgency=high * Security fix: prevent denial of service by not freezing when an HTTP transaction is improperly terminated. * Fix Build-Depends to make sure that PAM support is always available. * CAN-2003-0195 stable/main/source/console-data_1999.08.29-24.2.diff.gz stable/main/binary-all/console-data_1999.08.29-24.2_all.deb stable/main/source/console-data_1999.08.29-24.2.dsc console-data (1999.08.29-24.2) stable; urgency=low * Fix depends to work properly on woody. Closes: #201659. * Change maintainer. stable/main/binary-sparc/colrconv_0.99.2-8_sparc.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-s390/colrconv_0.99.2-8_s390.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-powerpc/colrconv_0.99.2-8_powerpc.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-mipsel/colrconv_0.99.2-8_mipsel.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-mips/colrconv_0.99.2-8_mips.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-m68k/colrconv_0.99.2-8_m68k.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-ia64/colrconv_0.99.2-8_ia64.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-hppa/colrconv_0.99.2-8_hppa.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-arm/colrconv_0.99.2-8_arm.deb colrconv (0.99.2-8) unstable; urgency=low * Remove libc6-dev from Build-Depends line as per debian policy. stable/main/binary-s390/canna-utils_3.5b2-46.2_s390.deb stable/main/binary-s390/canna_3.5b2-46.2_s390.deb stable/main/binary-s390/libcanna1g_3.5b2-46.2_s390.deb stable/main/binary-s390/libcanna1g-dev_3.5b2-46.2_s390.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-powerpc/canna_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/libcanna1g-dev_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/canna-utils_3.5b2-46.2_powerpc.deb stable/main/binary-powerpc/libcanna1g_3.5b2-46.2_powerpc.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-mipsel/libcanna1g-dev_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/canna_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/canna-utils_3.5b2-46.2_mipsel.deb stable/main/binary-mipsel/libcanna1g_3.5b2-46.2_mipsel.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-mips/libcanna1g_3.5b2-46.2_mips.deb stable/main/binary-mips/libcanna1g-dev_3.5b2-46.2_mips.deb stable/main/binary-mips/canna-utils_3.5b2-46.2_mips.deb stable/main/binary-mips/canna_3.5b2-46.2_mips.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-m68k/libcanna1g_3.5b2-46.2_m68k.deb stable/main/binary-m68k/libcanna1g-dev_3.5b2-46.2_m68k.deb stable/main/binary-m68k/canna_3.5b2-46.2_m68k.deb stable/main/binary-m68k/canna-utils_3.5b2-46.2_m68k.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-ia64/libcanna1g-dev_3.5b2-46.2_ia64.deb stable/main/binary-ia64/canna_3.5b2-46.2_ia64.deb stable/main/binary-ia64/canna-utils_3.5b2-46.2_ia64.deb stable/main/binary-ia64/libcanna1g_3.5b2-46.2_ia64.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-i386/canna_3.5b2-46.2_i386.deb stable/main/binary-i386/canna-utils_3.5b2-46.2_i386.deb stable/main/binary-i386/libcanna1g_3.5b2-46.2_i386.deb stable/main/binary-i386/libcanna1g-dev_3.5b2-46.2_i386.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-hppa/libcanna1g-dev_3.5b2-46.2_hppa.deb stable/main/binary-hppa/libcanna1g_3.5b2-46.2_hppa.deb stable/main/binary-hppa/canna-utils_3.5b2-46.2_hppa.deb stable/main/binary-hppa/canna_3.5b2-46.2_hppa.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-arm/canna_3.5b2-46.2_arm.deb stable/main/binary-arm/canna-utils_3.5b2-46.2_arm.deb stable/main/binary-arm/libcanna1g-dev_3.5b2-46.2_arm.deb stable/main/binary-arm/libcanna1g_3.5b2-46.2_arm.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-alpha/libcanna1g_3.5b2-46.2_alpha.deb stable/main/binary-alpha/canna-utils_3.5b2-46.2_alpha.deb stable/main/binary-alpha/canna_3.5b2-46.2_alpha.deb stable/main/binary-alpha/libcanna1g-dev_3.5b2-46.2_alpha.deb canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/binary-sparc/libcanna1g-dev_3.5b2-46.2_sparc.deb stable/main/binary-sparc/canna-utils_3.5b2-46.2_sparc.deb stable/main/binary-sparc/canna_3.5b2-46.2_sparc.deb stable/main/source/canna_3.5b2-46.2.diff.gz stable/main/binary-sparc/libcanna1g_3.5b2-46.2_sparc.deb stable/main/source/canna_3.5b2-46.2.dsc canna (3.5b2-46.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and invalidate requests (CAN-2002-1159) * Used .2 since .1 was probably burnt and the buildd network has probably recorded the version string. stable/main/source/bugzilla_2.14.2-0woody4.diff.gz stable/main/source/bugzilla_2.14.2-0woody4.dsc stable/main/binary-all/bugzilla-doc_2.14.2-0woody4_all.deb stable/main/binary-all/bugzilla_2.14.2-0woody4_all.deb bugzilla (2.14.2-0woody4) stable-security; urgency=low * Non-maintainer upload by the security team * Apply upstream's fixes for two security bugs - collectstats.pl setting world-writable permissions http://bugzilla.mozilla.org/show_bug.cgi?id=183188 - Checksetup leaves editor backups of localconfig accessible http://bugzilla.mozilla.org/show_bug.cgi?id=186383 stable/main/binary-sparc/bind-dev_8.3.3-2.0woody1_sparc.deb stable/main/binary-sparc/bind_8.3.3-2.0woody1_sparc.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-s390/bind_8.3.3-2.0woody1_s390.deb stable/main/binary-s390/bind-dev_8.3.3-2.0woody1_s390.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody1_powerpc.deb stable/main/binary-powerpc/bind_8.3.3-2.0woody1_powerpc.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-mipsel/bind_8.3.3-2.0woody1_mipsel.deb stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody1_mipsel.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-mips/bind_8.3.3-2.0woody1_mips.deb stable/main/binary-mips/bind-dev_8.3.3-2.0woody1_mips.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-m68k/bind-dev_8.3.3-2.0woody1_m68k.deb stable/main/binary-m68k/bind_8.3.3-2.0woody1_m68k.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-ia64/bind_8.3.3-2.0woody1_ia64.deb stable/main/binary-ia64/bind-dev_8.3.3-2.0woody1_ia64.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-hppa/bind_8.3.3-2.0woody1_hppa.deb stable/main/binary-hppa/bind-dev_8.3.3-2.0woody1_hppa.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-arm/bind_8.3.3-2.0woody1_arm.deb stable/main/binary-arm/bind-dev_8.3.3-2.0woody1_arm.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-alpha/bind_8.3.3-2.0woody1_alpha.deb stable/main/binary-alpha/bind-dev_8.3.3-2.0woody1_alpha.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/source/bind_8.3.3-2.0woody1.dsc stable/main/binary-i386/bind_8.3.3-2.0woody1_i386.deb stable/main/binary-i386/bind-dev_8.3.3-2.0woody1_i386.deb stable/main/source/bind_8.3.3-2.0woody1.diff.gz stable/main/binary-all/bind-doc_8.3.3-2.0woody1_all.deb bind (1:8.3.3-2.0woody1) stable-security; urgency=low * Non-maintainer upload by the Security Team. * Include patches for CERT VU#852283 and VU#229595. stable/main/binary-sparc/balsa_1.2.4-2.2_sparc.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-s390/balsa_1.2.4-2.2_s390.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-powerpc/balsa_1.2.4-2.2_powerpc.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mipsel/balsa_1.2.4-2.2_mipsel.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-mips/balsa_1.2.4-2.2_mips.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-m68k/balsa_1.2.4-2.2_m68k.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-ia64/balsa_1.2.4-2.2_ia64.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-i386/balsa_1.2.4-2.2_i386.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-hppa/balsa_1.2.4-2.2_hppa.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/binary-arm/balsa_1.2.4-2.2_arm.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/main/source/balsa_1.2.4-2.2.diff.gz stable/main/source/balsa_1.2.4-2.2.dsc stable/main/binary-alpha/balsa_1.2.4-2.2_alpha.deb balsa (1.2.4-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mips and mipsel buildd being unable to build this package. stable/contrib/binary-sparc/autorespond_2.0.2-2woody1_sparc.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-s390/autorespond_2.0.2-2woody1_s390.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-powerpc/autorespond_2.0.2-2woody1_powerpc.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-mipsel/autorespond_2.0.2-2woody1_mipsel.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-mips/autorespond_2.0.2-2woody1_mips.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-m68k/autorespond_2.0.2-2woody1_m68k.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-ia64/autorespond_2.0.2-2woody1_ia64.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-hppa/autorespond_2.0.2-2woody1_hppa.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-arm/autorespond_2.0.2-2woody1_arm.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-alpha/autorespond_2.0.2-2woody1_alpha.deb autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/contrib/binary-i386/autorespond_2.0.2-2woody1_i386.deb stable/contrib/source/autorespond_2.0.2-2woody1.dsc stable/contrib/source/autorespond_2.0.2-2woody1.diff.gz autorespond (2.0.2-2woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow with EXT and HOST environment variables (CAN-2003-0654) stable/main/binary-sparc/atftp_0.6.0woody1_sparc.deb stable/main/binary-sparc/atftpd_0.6.0woody1_sparc.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-s390/atftpd_0.6.0woody1_s390.deb stable/main/binary-s390/atftp_0.6.0woody1_s390.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-powerpc/atftpd_0.6.0woody1_powerpc.deb stable/main/binary-powerpc/atftp_0.6.0woody1_powerpc.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-mipsel/atftpd_0.6.0woody1_mipsel.deb stable/main/binary-mipsel/atftp_0.6.0woody1_mipsel.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-mips/atftpd_0.6.0woody1_mips.deb stable/main/binary-mips/atftp_0.6.0woody1_mips.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-m68k/atftp_0.6.0woody1_m68k.deb stable/main/binary-m68k/atftpd_0.6.0woody1_m68k.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-ia64/atftpd_0.6.0woody1_ia64.deb stable/main/binary-ia64/atftp_0.6.0woody1_ia64.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-hppa/atftpd_0.6.0woody1_hppa.deb stable/main/binary-hppa/atftp_0.6.0woody1_hppa.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-arm/atftpd_0.6.0woody1_arm.deb stable/main/binary-arm/atftp_0.6.0woody1_arm.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-alpha/atftpd_0.6.0woody1_alpha.deb stable/main/binary-alpha/atftp_0.6.0woody1_alpha.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-i386/atftp_0.6.0woody1_i386.deb stable/main/source/atftp_0.6.0woody1.dsc stable/main/source/atftp_0.6.0woody1.tar.gz stable/main/binary-i386/atftpd_0.6.0woody1_i386.deb atftp (0.6.0woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in tftpd_send_file [tftpd_file.c] stable/main/binary-s390/apcupsd_3.8.5-1.1.1_s390.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-powerpc/apcupsd_3.8.5-1.1.1_powerpc.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-mipsel/apcupsd_3.8.5-1.1.1_mipsel.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-mips/apcupsd_3.8.5-1.1.1_mips.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-m68k/apcupsd_3.8.5-1.1.1_m68k.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-ia64/apcupsd_3.8.5-1.1.1_ia64.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-i386/apcupsd_3.8.5-1.1.1_i386.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-hppa/apcupsd_3.8.5-1.1.1_hppa.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-arm/apcupsd_3.8.5-1.1.1_arm.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-alpha/apcupsd_3.8.5-1.1.1_alpha.deb apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/source/apcupsd_3.8.5-1.1.1.diff.gz stable/main/binary-sparc/apcupsd_3.8.5-1.1.1_sparc.deb stable/main/source/apcupsd_3.8.5-1.1.1.dsc apcupsd (3.8.5-1.1.1) stable-security; urgency=high * Non-maintainer upload by the security team * Fixed root exploit of slave machines by upstream patch stable/main/binary-sparc/acm_5.0-3.woody.1_sparc.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-s390/acm_5.0-3.woody.1_s390.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-powerpc/acm_5.0-3.woody.1_powerpc.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-mipsel/acm_5.0-3.woody.1_mipsel.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-mips/acm_5.0-3.woody.1_mips.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-m68k/acm_5.0-3.woody.1_m68k.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-ia64/acm_5.0-3.woody.1_ia64.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-hppa/acm_5.0-3.woody.1_hppa.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-arm/acm_5.0-3.woody.1_arm.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/binary-alpha/acm_5.0-3.woody.1_alpha.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). stable/main/source/acm_5.0-3.woody.1.diff.gz stable/main/source/acm_5.0-3.woody.1.dsc stable/main/binary-i386/acm_5.0-3.woody.1_i386.deb acm (5.0-3.woody.1) stable-security; urgency=medium * Applied SunRPC XDR fix from glibc to identical code here (CVE-2002-0391) * Added missing dependency on NAS (won't build sound otherwise). ========================================= Mon, 16 Dec 2002 - Debian 3.0r1a released ========================================= No changes other than regenerated Packages files to include Task: fields that were dropped in 3.0r1 due to a config SNAFU. :-( ========================================= Sun, 15 Dec 2002 - Debian 3.0r1 released ========================================= Removed the following packages from stable: cdrdao | 1:1.1.5-3.1 | source, alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390 gcdmaster | 1:1.1.5-3.1 | alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390 (Reason: requested by Stable Release Manager) "Upstream reported: Due to license issues with the libedc_ecc library that is used by and distributed with cdrdao I have to temporarily freeze this project. All releases have been removed. See http://sourceforge.net/forum/forum.php?forum_id=213313 See http://bugs.debian.org/162788" kernel-doc-2.2.20 | 2.2.20-5 | all kernel-headers-2.2.20 | 2.2.20-4 | alpha kernel-image-2.2.20-alpha | 2.2.20-4 | source kernel-image-2.2.20-generic | 2.2.20-4 | alpha kernel-image-2.2.20-jensen | 2.2.20-4 | alpha kernel-image-2.2.20-nautilus | 2.2.20-4 | alpha kernel-image-2.2.20-smp | 2.2.20-4 | alpha kernel-source-2.2.20 | 2.2.20-5 | source, all pcmcia-modules-2.2.20 | 3.1.33-6k5 | i386 pcmcia-modules-2.2.20-compact | 3.1.33-6k5 | i386 pcmcia-modules-2.2.20-idepci | 3.1.33-6k5 | i386 (Reason: requested by Stable Release Manager) "Superseded by 2.2.22." ---- stable/main/binary-sparc/yaclc_1.3.6.1_sparc.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-s390/yaclc_1.3.6.1_s390.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-powerpc/yaclc_1.3.6.1_powerpc.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-mipsel/yaclc_1.3.6.1_mipsel.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-mips/yaclc_1.3.6.1_mips.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-m68k/yaclc_1.3.6.1_m68k.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-ia64/yaclc_1.3.6.1_ia64.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-i386/yaclc_1.3.6.1_i386.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-hppa/yaclc_1.3.6.1_hppa.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-arm/yaclc_1.3.6.1_arm.deb yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/source/yaclc_1.3.6.1.dsc stable/main/binary-alpha/yaclc_1.3.6.1_alpha.deb stable/main/source/yaclc_1.3.6.1.tar.gz yaclc (1.3.6.1) stable; urgency=high * Fixed a regular expression to parse the current BTS. Please consider for stable: old version does not work anymore, and this is a one-character change. stable/main/binary-s390/xinetd_2.3.4-1.2_s390.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-powerpc/xinetd_2.3.4-1.2_powerpc.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-mipsel/xinetd_2.3.4-1.2_mipsel.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-mips/xinetd_2.3.4-1.2_mips.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-m68k/xinetd_2.3.4-1.2_m68k.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-ia64/xinetd_2.3.4-1.2_ia64.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-i386/xinetd_2.3.4-1.2_i386.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-hppa/xinetd_2.3.4-1.2_hppa.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-arm/xinetd_2.3.4-1.2_arm.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-alpha/xinetd_2.3.4-1.2_alpha.deb xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-sparc/xinetd_2.3.4-1.2_sparc.deb stable/main/source/xinetd_2.3.4-1.2.dsc stable/main/source/xinetd_2.3.4-1.2.diff.gz xinetd (1:2.3.4-1.2) stable-security; urgency=high * Non-maintainer upload by Security Team * Applied a patch from SolarDesigner to keep xinetd from leaking the recently introduced signal pipe into services started from xinetd. stable/main/binary-s390/wwwoffle_2.7a-1.2_s390.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-powerpc/wwwoffle_2.7a-1.2_powerpc.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-mipsel/wwwoffle_2.7a-1.2_mipsel.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-mips/wwwoffle_2.7a-1.2_mips.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-m68k/wwwoffle_2.7a-1.2_m68k.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-ia64/wwwoffle_2.7a-1.2_ia64.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-i386/wwwoffle_2.7a-1.2_i386.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-hppa/wwwoffle_2.7a-1.2_hppa.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-arm/wwwoffle_2.7a-1.2_arm.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-alpha/wwwoffle_2.7a-1.2_alpha.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/source/wwwoffle_2.7a-1.2.dsc stable/main/source/wwwoffle_2.7a-1.2.diff.gz stable/main/binary-sparc/wwwoffle_2.7a-1.2_sparc.deb wwwoffle (2.7a-1.2) stable-security; urgency=medium * Non-maintainer, security upload * Corrected the reaction to a user request with negative Content-Length (see Bug#152756) * Fixed handling of empty password settings * Replaced CanonicaliseHost() with the latest from 2.7d, offered by upstream. This stops bad IPv6 format IP addresses in URLs from causing problems (memory overwriting, potential exploits). stable/main/binary-sparc/weex_2.6.1-4woody1_sparc.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-s390/weex_2.6.1-4woody1_s390.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-powerpc/weex_2.6.1-4woody1_powerpc.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-mipsel/weex_2.6.1-4woody1_mipsel.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-mips/weex_2.6.1-4woody1_mips.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-m68k/weex_2.6.1-4woody1_m68k.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-ia64/weex_2.6.1-4woody1_ia64.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-hppa/weex_2.6.1-4woody1_hppa.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-arm/weex_2.6.1-4woody1_arm.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-alpha/weex_2.6.1-4woody1_alpha.deb weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/source/weex_2.6.1-4woody1.dsc stable/main/binary-i386/weex_2.6.1-4woody1_i386.deb stable/main/source/weex_2.6.1-4woody1.diff.gz weex (2.6.1-4woody1) stable; urgency=medium * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug. Closes: Bug#150185 stable/main/binary-sparc/uptimed_0.1.7-2woody0_sparc.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-s390/uptimed_0.1.7-2woody0_s390.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-powerpc/uptimed_0.1.7-2woody0_powerpc.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-mipsel/uptimed_0.1.7-2woody0_mipsel.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-mips/uptimed_0.1.7-2woody0_mips.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-m68k/uptimed_0.1.7-2woody0_m68k.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-ia64/uptimed_0.1.7-2woody0_ia64.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-hppa/uptimed_0.1.7-2woody0_hppa.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-arm/uptimed_0.1.7-2woody0_arm.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/binary-alpha/uptimed_0.1.7-2woody0_alpha.deb uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/main/source/uptimed_0.1.7-2woody0.dsc stable/main/binary-i386/uptimed_0.1.7-2woody0_i386.deb stable/main/binary-all/uprecords-cgi_0.1.7-2woody0_all.deb stable/main/source/uptimed_0.1.7-2woody0.diff.gz uptimed (1:0.1.7-2woody0) stable; urgency=low * Fixed upgrade path from potato (Closes: #157918) stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody1_all.deb stable/contrib/source/tomcat4_4.0.3-3woody1.dsc stable/contrib/source/tomcat4_4.0.3-3woody1.diff.gz stable/contrib/binary-all/tomcat4_4.0.3-3woody1_all.deb stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody1_all.deb tomcat4 (4.0.3-3woody1) stable-security; urgency=high * Include security patch from Tomcat 4.0.5 which fixes a JSP source disclosure vulnerability stable/main/binary-s390/tkmail_4.0beta9-8.1_s390.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-powerpc/tkmail_4.0beta9-8.1_powerpc.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-mipsel/tkmail_4.0beta9-8.1_mipsel.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-mips/tkmail_4.0beta9-8.1_mips.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-m68k/tkmail_4.0beta9-8.1_m68k.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-ia64/tkmail_4.0beta9-8.1_ia64.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-i386/tkmail_4.0beta9-8.1_i386.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-hppa/tkmail_4.0beta9-8.1_hppa.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-arm/tkmail_4.0beta9-8.1_arm.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-alpha/tkmail_4.0beta9-8.1_alpha.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/source/tkmail_4.0beta9-8.1.dsc stable/main/source/tkmail_4.0beta9-8.1.diff.gz stable/main/binary-sparc/tkmail_4.0beta9-8.1_sparc.deb tkmail (4.0beta9-8.1) stable-security; urgency=high * Non-maintainer upload by security team * Create temporary files with O_EXCL and 0600 permissions. * Thanks to Matej Vela stable/main/binary-s390/tinyproxy_1.4.3-2woody2_s390.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-powerpc/tinyproxy_1.4.3-2woody2_powerpc.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-mipsel/tinyproxy_1.4.3-2woody2_mipsel.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-mips/tinyproxy_1.4.3-2woody2_mips.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-m68k/tinyproxy_1.4.3-2woody2_m68k.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-ia64/tinyproxy_1.4.3-2woody2_ia64.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-i386/tinyproxy_1.4.3-2woody2_i386.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-hppa/tinyproxy_1.4.3-2woody2_hppa.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-arm/tinyproxy_1.4.3-2woody2_arm.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-alpha/tinyproxy_1.4.3-2woody2_alpha.deb tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/source/tinyproxy_1.4.3-2woody2.diff.gz stable/main/binary-sparc/tinyproxy_1.4.3-2woody2_sparc.deb stable/main/source/tinyproxy_1.4.3-2woody2.dsc tinyproxy (1.4.3-2woody2) stable-security; urgency=high * Non-maintainer release by the security team * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different incarnations of 1.4.3-2woody1, all by the maintainer, apparently. * The package had to be rebuilt anyway becaus of the two different versions with the same version number and a broken distribution line. . Only remove /etc/tinyproxy on purge . Recreate that directory if it was removed accidently . Store tinyproxy.conf in /usr/share so the postinst script is able to copy it back . SECURITY: Fixed double-free errors in consultation with upstream authors. This fix affects woody. (Bug#147240) . SecurityFocus has info on this bug at: http://online.securityfocus.com/bid/4731/info/ stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.1_sparc.deb stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.1_sparc.deb stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.1_sparc.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.1_s390.deb stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.1_s390.deb stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.1_s390.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.1_powerpc.deb stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.1_powerpc.deb stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.1_powerpc.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.1_mips.deb stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.1_mips.deb stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.1_mips.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.1_m68k.deb stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.1_m68k.deb stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.1_m68k.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.1_ia64.deb stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.1_ia64.deb stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.1_ia64.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.1_i386.deb stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.1_i386.deb stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.1_i386.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.1_hppa.deb stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.1_hppa.deb stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.1_hppa.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.1_arm.deb stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.1_arm.deb stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.1_arm.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.1_alpha.deb stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.1_alpha.deb stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.1_alpha.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/source/tetex-bin_1.0.7+20011202-7.1.dsc stable/main/source/tetex-bin_1.0.7+20011202-7.1.tar.gz stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.1_mipsel.deb stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.1_mipsel.deb stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.1_mipsel.deb tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch) * Add special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. Added to {config,texk}/config.guess. stable/main/source/tendra_4.1.2-9.woody1.diff.gz stable/main/binary-i386/tendra_4.1.2-9.woody1_i386.deb stable/main/source/tendra_4.1.2-9.woody1.dsc tendra (4.1.2-9.woody1) stable; urgency=low * Don't copy runtime files. stable/main/binary-sparc/tcpdump_3.6.2-2.2_sparc.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-s390/tcpdump_3.6.2-2.2_s390.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-powerpc/tcpdump_3.6.2-2.2_powerpc.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-mipsel/tcpdump_3.6.2-2.2_mipsel.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-mips/tcpdump_3.6.2-2.2_mips.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-m68k/tcpdump_3.6.2-2.2_m68k.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-ia64/tcpdump_3.6.2-2.2_ia64.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-hppa/tcpdump_3.6.2-2.2_hppa.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-arm/tcpdump_3.6.2-2.2_arm.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-alpha/tcpdump_3.6.2-2.2_alpha.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/source/tcpdump_3.6.2-2.2.dsc stable/main/source/tcpdump_3.6.2-2.2.diff.gz stable/main/binary-i386/tcpdump_3.6.2-2.2_i386.deb tcpdump (3.6.2-2.2) stable-security; urgency=high * Non-maintainer upload by security team * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0 stable/main/binary-sparc/sympa_3.3.3-3_sparc.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-s390/sympa_3.3.3-3_s390.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-powerpc/sympa_3.3.3-3_powerpc.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-mipsel/sympa_3.3.3-3_mipsel.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-mips/sympa_3.3.3-3_mips.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-m68k/sympa_3.3.3-3_m68k.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-ia64/sympa_3.3.3-3_ia64.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-hppa/sympa_3.3.3-3_hppa.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-arm/sympa_3.3.3-3_arm.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-alpha/sympa_3.3.3-3_alpha.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/source/sympa_3.3.3-3.diff.gz stable/main/source/sympa_3.3.3-3.dsc stable/main/binary-i386/sympa_3.3.3-3_i386.deb stable/main/binary-all/wwsympa_3.3.3-3_all.deb sympa (3.3.3-3) stable; urgency=high * debian/control: moved libnet-ldap-perl dependency from Suggests to Depends. Closes: Bug#167924. stable/main/binary-sparc/super_3.16.1-1.1_sparc.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-s390/super_3.16.1-1.1_s390.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-powerpc/super_3.16.1-1.1_powerpc.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-mipsel/super_3.16.1-1.1_mipsel.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-mips/super_3.16.1-1.1_mips.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-ia64/super_3.16.1-1.1_ia64.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-i386/super_3.16.1-1.1_i386.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-hppa/super_3.16.1-1.1_hppa.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-arm/super_3.16.1-1.1_arm.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/binary-alpha/super_3.16.1-1.1_alpha.deb super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/source/super_3.16.1-1.1.diff.gz stable/main/binary-m68k/super_3.16.1-1.1_m68k.deb stable/main/source/super_3.16.1-1.1.dsc super (3.16.1-1.1) stable-security; urgency=high * Applied patch from the current Debian maintainer Robert Luberda that fixes a format string vulnerability, which was discovered by GOBBLES stable/main/source/squirrelmail_1.2.6-1.2.diff.gz stable/main/binary-all/squirrelmail_1.2.6-1.2_all.deb stable/main/source/squirrelmail_1.2.6-1.2.dsc squirrelmail (1:1.2.6-1.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Fixed the options page, whoops stable/main/binary-sparc/snort-mysql_1.8.4beta1-3_sparc.deb stable/main/binary-sparc/snort-common_1.8.4beta1-3_sparc.deb stable/main/binary-sparc/snort_1.8.4beta1-3_sparc.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-s390/snort_1.8.4beta1-3_s390.deb stable/main/binary-s390/snort-mysql_1.8.4beta1-3_s390.deb stable/main/binary-s390/snort-common_1.8.4beta1-3_s390.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-powerpc/snort-common_1.8.4beta1-3_powerpc.deb stable/main/binary-powerpc/snort_1.8.4beta1-3_powerpc.deb stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3_powerpc.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3_mipsel.deb stable/main/binary-mipsel/snort_1.8.4beta1-3_mipsel.deb stable/main/binary-mipsel/snort-common_1.8.4beta1-3_mipsel.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-mips/snort-common_1.8.4beta1-3_mips.deb stable/main/binary-mips/snort_1.8.4beta1-3_mips.deb stable/main/binary-mips/snort-mysql_1.8.4beta1-3_mips.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-m68k/snort-common_1.8.4beta1-3_m68k.deb stable/main/binary-m68k/snort-mysql_1.8.4beta1-3_m68k.deb stable/main/binary-m68k/snort_1.8.4beta1-3_m68k.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-ia64/snort-mysql_1.8.4beta1-3_ia64.deb stable/main/binary-ia64/snort-common_1.8.4beta1-3_ia64.deb stable/main/binary-ia64/snort_1.8.4beta1-3_ia64.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-hppa/snort-mysql_1.8.4beta1-3_hppa.deb stable/main/binary-hppa/snort_1.8.4beta1-3_hppa.deb stable/main/binary-hppa/snort-common_1.8.4beta1-3_hppa.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-arm/snort_1.8.4beta1-3_arm.deb stable/main/binary-arm/snort-mysql_1.8.4beta1-3_arm.deb stable/main/binary-arm/snort-common_1.8.4beta1-3_arm.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-alpha/snort_1.8.4beta1-3_alpha.deb stable/main/binary-alpha/snort-common_1.8.4beta1-3_alpha.deb stable/main/binary-alpha/snort-mysql_1.8.4beta1-3_alpha.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-all/snort-rules-default_1.8.4beta1-3_all.deb stable/main/source/snort_1.8.4beta1-3.diff.gz stable/main/binary-i386/snort-common_1.8.4beta1-3_i386.deb stable/main/source/snort_1.8.4beta1-3.dsc stable/main/binary-i386/snort-mysql_1.8.4beta1-3_i386.deb stable/main/binary-i386/snort_1.8.4beta1-3_i386.deb stable/main/binary-all/snort-doc_1.8.4beta1-3_all.deb snort (1.8.4beta1-3) stable; urgency=low + Mandatory upload to stable because the previous package had serious problems that were fixed only one package release later that JUST didn't get into woody. ! Fixed 'snort.debian.conf is empty at fresh install' + New 'snort-stat' included, fixes 'Empty subject' bugs + Fixes to daily cronjob's email thingy. Now honours DEBIAN_SNORT_STAT_TRESHOLD stable/main/binary-sparc/silo_1.2.5-2_sparc.deb stable/main/source/silo_1.2.5-2.diff.gz stable/main/source/silo_1.2.5-2.dsc silo (1.2.5-2) stable; urgency=low * Add patch for UltraSPARC III+ (Cheetah+) support from DaveM. stable/main/binary-s390/libscrollkeeper0_0.3.6-3.1_s390.deb stable/main/binary-s390/libscrollkeeper-dev_0.3.6-3.1_s390.deb stable/main/binary-s390/scrollkeeper_0.3.6-3.1_s390.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-powerpc/libscrollkeeper0_0.3.6-3.1_powerpc.deb stable/main/binary-powerpc/scrollkeeper_0.3.6-3.1_powerpc.deb stable/main/binary-powerpc/libscrollkeeper-dev_0.3.6-3.1_powerpc.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-mipsel/libscrollkeeper0_0.3.6-3.1_mipsel.deb stable/main/binary-mipsel/libscrollkeeper-dev_0.3.6-3.1_mipsel.deb stable/main/binary-mipsel/scrollkeeper_0.3.6-3.1_mipsel.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-mips/libscrollkeeper0_0.3.6-3.1_mips.deb stable/main/binary-mips/libscrollkeeper-dev_0.3.6-3.1_mips.deb stable/main/binary-mips/scrollkeeper_0.3.6-3.1_mips.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-m68k/libscrollkeeper0_0.3.6-3.1_m68k.deb stable/main/binary-m68k/libscrollkeeper-dev_0.3.6-3.1_m68k.deb stable/main/binary-m68k/scrollkeeper_0.3.6-3.1_m68k.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-ia64/libscrollkeeper0_0.3.6-3.1_ia64.deb stable/main/binary-ia64/scrollkeeper_0.3.6-3.1_ia64.deb stable/main/binary-ia64/libscrollkeeper-dev_0.3.6-3.1_ia64.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-i386/libscrollkeeper-dev_0.3.6-3.1_i386.deb stable/main/binary-i386/scrollkeeper_0.3.6-3.1_i386.deb stable/main/binary-i386/libscrollkeeper0_0.3.6-3.1_i386.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-hppa/libscrollkeeper0_0.3.6-3.1_hppa.deb stable/main/binary-hppa/libscrollkeeper-dev_0.3.6-3.1_hppa.deb stable/main/binary-hppa/scrollkeeper_0.3.6-3.1_hppa.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-arm/libscrollkeeper-dev_0.3.6-3.1_arm.deb stable/main/binary-arm/libscrollkeeper0_0.3.6-3.1_arm.deb stable/main/binary-arm/scrollkeeper_0.3.6-3.1_arm.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-alpha/scrollkeeper_0.3.6-3.1_alpha.deb stable/main/binary-alpha/libscrollkeeper0_0.3.6-3.1_alpha.deb stable/main/binary-alpha/libscrollkeeper-dev_0.3.6-3.1_alpha.deb scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-sparc/libscrollkeeper-dev_0.3.6-3.1_sparc.deb stable/main/binary-sparc/libscrollkeeper0_0.3.6-3.1_sparc.deb stable/main/source/scrollkeeper_0.3.6-3.1.dsc stable/main/binary-sparc/scrollkeeper_0.3.6-3.1_sparc.deb stable/main/source/scrollkeeper_0.3.6-3.1.diff.gz scrollkeeper (0.3.6-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied patch by Alexander Larsson to fix temporary file vulnerability (CAN-2002-0662) stable/main/binary-sparc/samba_2.2.3a-12_sparc.deb stable/main/binary-sparc/libpam-smbpass_2.2.3a-12_sparc.deb stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12_sparc.deb stable/main/binary-sparc/smbclient_2.2.3a-12_sparc.deb stable/main/binary-sparc/winbind_2.2.3a-12_sparc.deb stable/main/binary-sparc/samba-common_2.2.3a-12_sparc.deb stable/main/binary-sparc/libsmbclient_2.2.3a-12_sparc.deb stable/main/binary-sparc/smbfs_2.2.3a-12_sparc.deb stable/main/binary-sparc/swat_2.2.3a-12_sparc.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-s390/libsmbclient-dev_2.2.3a-12_s390.deb stable/main/binary-s390/libpam-smbpass_2.2.3a-12_s390.deb stable/main/binary-s390/smbclient_2.2.3a-12_s390.deb stable/main/binary-s390/libsmbclient_2.2.3a-12_s390.deb stable/main/binary-s390/samba-common_2.2.3a-12_s390.deb stable/main/binary-s390/smbfs_2.2.3a-12_s390.deb stable/main/binary-s390/samba_2.2.3a-12_s390.deb stable/main/binary-s390/swat_2.2.3a-12_s390.deb stable/main/binary-s390/winbind_2.2.3a-12_s390.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-powerpc/winbind_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/swat_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/samba-common_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/smbfs_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/samba_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/smbclient_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libsmbclient_2.2.3a-12_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12_powerpc.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-mipsel/smbclient_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libsmbclient_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/smbfs_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/samba_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/samba-common_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/swat_2.2.3a-12_mipsel.deb stable/main/binary-mipsel/winbind_2.2.3a-12_mipsel.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-mips/swat_2.2.3a-12_mips.deb stable/main/binary-mips/libsmbclient-dev_2.2.3a-12_mips.deb stable/main/binary-mips/libsmbclient_2.2.3a-12_mips.deb stable/main/binary-mips/smbfs_2.2.3a-12_mips.deb stable/main/binary-mips/libpam-smbpass_2.2.3a-12_mips.deb stable/main/binary-mips/samba-common_2.2.3a-12_mips.deb stable/main/binary-mips/smbclient_2.2.3a-12_mips.deb stable/main/binary-mips/winbind_2.2.3a-12_mips.deb stable/main/binary-mips/samba_2.2.3a-12_mips.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-m68k/swat_2.2.3a-12_m68k.deb stable/main/binary-m68k/samba_2.2.3a-12_m68k.deb stable/main/binary-m68k/winbind_2.2.3a-12_m68k.deb stable/main/binary-m68k/libsmbclient_2.2.3a-12_m68k.deb stable/main/binary-m68k/libpam-smbpass_2.2.3a-12_m68k.deb stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12_m68k.deb stable/main/binary-m68k/samba-common_2.2.3a-12_m68k.deb stable/main/binary-m68k/smbclient_2.2.3a-12_m68k.deb stable/main/binary-m68k/smbfs_2.2.3a-12_m68k.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-ia64/libsmbclient_2.2.3a-12_ia64.deb stable/main/binary-ia64/smbfs_2.2.3a-12_ia64.deb stable/main/binary-ia64/swat_2.2.3a-12_ia64.deb stable/main/binary-ia64/samba_2.2.3a-12_ia64.deb stable/main/binary-ia64/samba-common_2.2.3a-12_ia64.deb stable/main/binary-ia64/smbclient_2.2.3a-12_ia64.deb stable/main/binary-ia64/winbind_2.2.3a-12_ia64.deb stable/main/binary-ia64/libpam-smbpass_2.2.3a-12_ia64.deb stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12_ia64.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-hppa/libsmbclient_2.2.3a-12_hppa.deb stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12_hppa.deb stable/main/binary-hppa/winbind_2.2.3a-12_hppa.deb stable/main/binary-hppa/libpam-smbpass_2.2.3a-12_hppa.deb stable/main/binary-hppa/samba-common_2.2.3a-12_hppa.deb stable/main/binary-hppa/smbfs_2.2.3a-12_hppa.deb stable/main/binary-hppa/swat_2.2.3a-12_hppa.deb stable/main/binary-hppa/smbclient_2.2.3a-12_hppa.deb stable/main/binary-hppa/samba_2.2.3a-12_hppa.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-arm/samba-common_2.2.3a-12_arm.deb stable/main/binary-arm/smbfs_2.2.3a-12_arm.deb stable/main/binary-arm/winbind_2.2.3a-12_arm.deb stable/main/binary-arm/swat_2.2.3a-12_arm.deb stable/main/binary-arm/libsmbclient_2.2.3a-12_arm.deb stable/main/binary-arm/libpam-smbpass_2.2.3a-12_arm.deb stable/main/binary-arm/libsmbclient-dev_2.2.3a-12_arm.deb stable/main/binary-arm/smbclient_2.2.3a-12_arm.deb stable/main/binary-arm/samba_2.2.3a-12_arm.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-alpha/libpam-smbpass_2.2.3a-12_alpha.deb stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12_alpha.deb stable/main/binary-alpha/smbfs_2.2.3a-12_alpha.deb stable/main/binary-alpha/samba-common_2.2.3a-12_alpha.deb stable/main/binary-alpha/swat_2.2.3a-12_alpha.deb stable/main/binary-alpha/libsmbclient_2.2.3a-12_alpha.deb stable/main/binary-alpha/winbind_2.2.3a-12_alpha.deb stable/main/binary-alpha/smbclient_2.2.3a-12_alpha.deb stable/main/binary-alpha/samba_2.2.3a-12_alpha.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-all/samba-doc_2.2.3a-12_all.deb stable/main/binary-i386/libpam-smbpass_2.2.3a-12_i386.deb stable/main/binary-i386/samba_2.2.3a-12_i386.deb stable/main/binary-i386/samba-common_2.2.3a-12_i386.deb stable/main/source/samba_2.2.3a-12.diff.gz stable/main/source/samba_2.2.3a-12.dsc stable/main/binary-i386/winbind_2.2.3a-12_i386.deb stable/main/binary-i386/smbfs_2.2.3a-12_i386.deb stable/main/binary-i386/smbclient_2.2.3a-12_i386.deb stable/main/binary-i386/libsmbclient-dev_2.2.3a-12_i386.deb stable/main/binary-i386/libsmbclient_2.2.3a-12_i386.deb stable/main/binary-i386/swat_2.2.3a-12_i386.deb samba (2.2.3a-12) stable-security; urgency=high * rebuild and reupload, since someone thought the last build was bad enough to set satie on fire. stable/main/binary-sparc/librio500-dev_0.7-7woody2_sparc.deb stable/main/binary-sparc/rio500_0.7-7woody2_sparc.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-s390/librio500-dev_0.7-7woody2_s390.deb stable/main/binary-s390/rio500_0.7-7woody2_s390.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-powerpc/librio500-dev_0.7-7woody2_powerpc.deb stable/main/binary-powerpc/rio500_0.7-7woody2_powerpc.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-mipsel/librio500-dev_0.7-7woody2_mipsel.deb stable/main/binary-mipsel/rio500_0.7-7woody2_mipsel.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-mips/librio500-dev_0.7-7woody2_mips.deb stable/main/binary-mips/rio500_0.7-7woody2_mips.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-m68k/librio500-dev_0.7-7woody2_m68k.deb stable/main/binary-m68k/rio500_0.7-7woody2_m68k.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-ia64/librio500-dev_0.7-7woody2_ia64.deb stable/main/binary-ia64/rio500_0.7-7woody2_ia64.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-hppa/librio500-dev_0.7-7woody2_hppa.deb stable/main/binary-hppa/rio500_0.7-7woody2_hppa.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-arm/rio500_0.7-7woody2_arm.deb stable/main/binary-arm/librio500-dev_0.7-7woody2_arm.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-alpha/rio500_0.7-7woody2_alpha.deb stable/main/binary-alpha/librio500-dev_0.7-7woody2_alpha.deb rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-i386/librio500-dev_0.7-7woody2_i386.deb stable/main/source/rio500_0.7-7woody2.diff.gz stable/main/binary-i386/rio500_0.7-7woody2_i386.deb stable/main/source/rio500_0.7-7woody2.dsc rio500 (0.7-7woody2) stable; urgency=low * Re-upload using the correct email address in the changelog, so this won't be processed as a NMU. stable/main/binary-sparc/qpopper_4.0.4-2.woody.1_sparc.deb stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.1_sparc.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-s390/qpopper_4.0.4-2.woody.1_s390.deb stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.1_s390.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-powerpc/qpopper_4.0.4-2.woody.1_powerpc.deb stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.1_powerpc.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-mipsel/qpopper_4.0.4-2.woody.1_mipsel.deb stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.1_mipsel.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-mips/qpopper_4.0.4-2.woody.1_mips.deb stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.1_mips.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.1_m68k.deb stable/main/binary-m68k/qpopper_4.0.4-2.woody.1_m68k.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-ia64/qpopper_4.0.4-2.woody.1_ia64.deb stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.1_ia64.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-hppa/qpopper_4.0.4-2.woody.1_hppa.deb stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.1_hppa.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.1_arm.deb stable/main/binary-arm/qpopper_4.0.4-2.woody.1_arm.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.1_alpha.deb stable/main/binary-alpha/qpopper_4.0.4-2.woody.1_alpha.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.1_i386.deb stable/main/source/qpopper_4.0.4-2.woody.1.dsc stable/main/source/qpopper_4.0.4-2.woody.1.diff.gz stable/main/binary-i386/qpopper_4.0.4-2.woody.1_i386.deb qpopper (4.0.4-2.woody.1) stable; urgency=low * qpopper couldn't work with Eudora clients and openssl 0.9.6c-2.woody.1 that was provided in DSA-136. This verison fixed that bug. stable/main/binary-s390/python1.5-mpz_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-gdbm_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-tk_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5-dev_1.5.2-23.3_s390.deb stable/main/binary-s390/python1.5_1.5.2-23.3_s390.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-powerpc/python1.5_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-gdbm_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-tk_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-mpz_1.5.2-23.3_powerpc.deb stable/main/binary-powerpc/python1.5-dev_1.5.2-23.3_powerpc.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-mipsel/python1.5-dev_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-tk_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-mpz_1.5.2-23.3_mipsel.deb stable/main/binary-mipsel/python1.5-gdbm_1.5.2-23.3_mipsel.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-mips/python1.5-gdbm_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-tk_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-dev_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5_1.5.2-23.3_mips.deb stable/main/binary-mips/python1.5-mpz_1.5.2-23.3_mips.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-m68k/python1.5_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-mpz_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-gdbm_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-dev_1.5.2-23.3_m68k.deb stable/main/binary-m68k/python1.5-tk_1.5.2-23.3_m68k.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-ia64/python1.5-dev_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-tk_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-gdbm_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5_1.5.2-23.3_ia64.deb stable/main/binary-ia64/python1.5-mpz_1.5.2-23.3_ia64.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-i386/python1.5-mpz_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-gdbm_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-dev_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5-tk_1.5.2-23.3_i386.deb stable/main/binary-i386/python1.5_1.5.2-23.3_i386.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-hppa/python1.5_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-mpz_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-tk_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-dev_1.5.2-23.3_hppa.deb stable/main/binary-hppa/python1.5-gdbm_1.5.2-23.3_hppa.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-arm/python1.5_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-tk_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-mpz_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-dev_1.5.2-23.3_arm.deb stable/main/binary-arm/python1.5-gdbm_1.5.2-23.3_arm.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-alpha/python1.5-gdbm_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-mpz_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-dev_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5-tk_1.5.2-23.3_alpha.deb stable/main/binary-alpha/python1.5_1.5.2-23.3_alpha.deb python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-sparc/python1.5-mpz_1.5.2-23.3_sparc.deb stable/main/binary-sparc/python1.5-tk_1.5.2-23.3_sparc.deb stable/main/binary-sparc/python1.5-dev_1.5.2-23.3_sparc.deb stable/main/source/python1.5_1.5.2-23.3.dsc stable/main/binary-all/idle-python1.5_1.5.2-23.3_all.deb stable/main/binary-sparc/python1.5_1.5.2-23.3_sparc.deb stable/main/binary-all/python1.5-examples_1.5.2-23.3_all.deb stable/main/binary-sparc/python1.5-gdbm_1.5.2-23.3_sparc.deb stable/main/source/python1.5_1.5.2-23.3.diff.gz python1.5 (1.5.2-23.3) stable-security; urgency=high * Another non-maintainer upload by the security team * Correct os.py to be compatible with Python 1.5 where no string method foo.split() exists but only a module member string.split() from the string module which needs to be imported. stable/main/binary-s390/purity_1-14.2_s390.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-powerpc/purity_1-14.2_powerpc.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-mipsel/purity_1-14.2_mipsel.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-mips/purity_1-14.2_mips.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-m68k/purity_1-14.2_m68k.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-ia64/purity_1-14.2_ia64.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-i386/purity_1-14.2_i386.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-hppa/purity_1-14.2_hppa.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-arm/purity_1-14.2_arm.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-alpha/purity_1-14.2_alpha.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/source/purity_1-14.2.dsc stable/main/source/purity_1-14.2.diff.gz stable/main/binary-sparc/purity_1-14.2_sparc.deb purity (1-14.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed two buffer overflows * Removed .orig file which was left over from patching stable/main/binary-m68k/postfix-tls_1.1.11+tls0.7.15-0.woody1_m68k.deb postfix-tls (1.1.11+tls0.7.15-0.woody1) testing; urgency=low * New postfix release. stable/main/binary-sparc/php4-mysql_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-sybase_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-odbc_4.1.2-6_sparc.deb stable/main/binary-sparc/caudium-php4_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-recode_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-cgi_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-gd_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-imap_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-mcal_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-snmp_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-ldap_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-curl_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-xslt_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-mhash_4.1.2-6_sparc.deb stable/main/binary-sparc/php4-domxml_4.1.2-6_sparc.deb stable/main/binary-sparc/php4_4.1.2-6_sparc.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-s390/php4-mhash_4.1.2-6_s390.deb stable/main/binary-s390/caudium-php4_4.1.2-6_s390.deb stable/main/binary-s390/php4-domxml_4.1.2-6_s390.deb stable/main/binary-s390/php4-mcal_4.1.2-6_s390.deb stable/main/binary-s390/php4-imap_4.1.2-6_s390.deb stable/main/binary-s390/php4-mysql_4.1.2-6_s390.deb stable/main/binary-s390/php4-cgi_4.1.2-6_s390.deb stable/main/binary-s390/php4-xslt_4.1.2-6_s390.deb stable/main/binary-s390/php4-recode_4.1.2-6_s390.deb stable/main/binary-s390/php4_4.1.2-6_s390.deb stable/main/binary-s390/php4-ldap_4.1.2-6_s390.deb stable/main/binary-s390/php4-odbc_4.1.2-6_s390.deb stable/main/binary-s390/php4-snmp_4.1.2-6_s390.deb stable/main/binary-s390/php4-sybase_4.1.2-6_s390.deb stable/main/binary-s390/php4-curl_4.1.2-6_s390.deb stable/main/binary-s390/php4-gd_4.1.2-6_s390.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-mipsel/php4-recode_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-gd_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-imap_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.1.2-6_mipsel.deb stable/main/binary-mipsel/caudium-php4_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-curl_4.1.2-6_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.1.2-6_mipsel.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-mips/php4-domxml_4.1.2-6_mips.deb stable/main/binary-mips/php4_4.1.2-6_mips.deb stable/main/binary-mips/php4-xslt_4.1.2-6_mips.deb stable/main/binary-mips/php4-imap_4.1.2-6_mips.deb stable/main/binary-mips/php4-odbc_4.1.2-6_mips.deb stable/main/binary-mips/php4-recode_4.1.2-6_mips.deb stable/main/binary-mips/php4-sybase_4.1.2-6_mips.deb stable/main/binary-mips/php4-gd_4.1.2-6_mips.deb stable/main/binary-mips/caudium-php4_4.1.2-6_mips.deb stable/main/binary-mips/php4-cgi_4.1.2-6_mips.deb stable/main/binary-mips/php4-curl_4.1.2-6_mips.deb stable/main/binary-mips/php4-ldap_4.1.2-6_mips.deb stable/main/binary-mips/php4-mcal_4.1.2-6_mips.deb stable/main/binary-mips/php4-mhash_4.1.2-6_mips.deb stable/main/binary-mips/php4-snmp_4.1.2-6_mips.deb stable/main/binary-mips/php4-mysql_4.1.2-6_mips.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-m68k/caudium-php4_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-domxml_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mysql_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-sybase_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-gd_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-odbc_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-cgi_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-ldap_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-recode_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mcal_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-curl_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-mhash_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-xslt_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-imap_4.1.2-6_m68k.deb stable/main/binary-m68k/php4_4.1.2-6_m68k.deb stable/main/binary-m68k/php4-snmp_4.1.2-6_m68k.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-ia64/php4-xslt_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-cgi_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mysql_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-domxml_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-recode_4.1.2-6_ia64.deb stable/main/binary-ia64/php4_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-sybase_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-snmp_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-odbc_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mhash_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-curl_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-ldap_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-mcal_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-imap_4.1.2-6_ia64.deb stable/main/binary-ia64/caudium-php4_4.1.2-6_ia64.deb stable/main/binary-ia64/php4-gd_4.1.2-6_ia64.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-hppa/php4-imap_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-domxml_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-cgi_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mysql_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-sybase_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-odbc_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-ldap_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-recode_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-snmp_4.1.2-6_hppa.deb stable/main/binary-hppa/caudium-php4_4.1.2-6_hppa.deb stable/main/binary-hppa/php4_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-gd_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-curl_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mhash_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-xslt_4.1.2-6_hppa.deb stable/main/binary-hppa/php4-mcal_4.1.2-6_hppa.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-arm/php4-odbc_4.1.2-6_arm.deb stable/main/binary-arm/php4-ldap_4.1.2-6_arm.deb stable/main/binary-arm/php4-sybase_4.1.2-6_arm.deb stable/main/binary-arm/caudium-php4_4.1.2-6_arm.deb stable/main/binary-arm/php4-mysql_4.1.2-6_arm.deb stable/main/binary-arm/php4-snmp_4.1.2-6_arm.deb stable/main/binary-arm/php4-domxml_4.1.2-6_arm.deb stable/main/binary-arm/php4-recode_4.1.2-6_arm.deb stable/main/binary-arm/php4-gd_4.1.2-6_arm.deb stable/main/binary-arm/php4_4.1.2-6_arm.deb stable/main/binary-arm/php4-xslt_4.1.2-6_arm.deb stable/main/binary-arm/php4-cgi_4.1.2-6_arm.deb stable/main/binary-arm/php4-imap_4.1.2-6_arm.deb stable/main/binary-arm/php4-mcal_4.1.2-6_arm.deb stable/main/binary-arm/php4-mhash_4.1.2-6_arm.deb stable/main/binary-arm/php4-curl_4.1.2-6_arm.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-alpha/php4-ldap_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-imap_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mhash_4.1.2-6_alpha.deb stable/main/binary-alpha/caudium-php4_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-domxml_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mcal_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-curl_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-snmp_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-gd_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-cgi_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-mysql_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-recode_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-xslt_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-odbc_4.1.2-6_alpha.deb stable/main/binary-alpha/php4-sybase_4.1.2-6_alpha.deb stable/main/binary-alpha/php4_4.1.2-6_alpha.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-powerpc/php4-mcal_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-gd_4.1.2-6_i386.deb stable/main/binary-i386/php4_4.1.2-6_i386.deb stable/main/binary-i386/php4-domxml_4.1.2-6_i386.deb stable/main/binary-all/php4-pear_4.1.2-6_all.deb stable/main/binary-i386/php4-ldap_4.1.2-6_i386.deb stable/main/binary-all/php4-dev_4.1.2-6_all.deb stable/main/binary-powerpc/php4-snmp_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-curl_4.1.2-6_i386.deb stable/main/source/php4_4.1.2-6.dsc stable/main/binary-powerpc/php4-sybase_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-mcal_4.1.2-6_i386.deb stable/main/binary-i386/php4-imap_4.1.2-6_i386.deb stable/main/binary-i386/php4-mysql_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-xslt_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-recode_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-snmp_4.1.2-6_i386.deb stable/main/binary-i386/php4-sybase_4.1.2-6_i386.deb stable/main/binary-i386/caudium-php4_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-ldap_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.1.2-6_powerpc.deb stable/main/source/php4_4.1.2-6.diff.gz stable/main/binary-powerpc/php4-gd_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-xslt_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-domxml_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-curl_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-cgi_4.1.2-6_i386.deb stable/main/binary-i386/php4-recode_4.1.2-6_i386.deb stable/main/binary-i386/php4-odbc_4.1.2-6_i386.deb stable/main/binary-powerpc/php4-cgi_4.1.2-6_powerpc.deb stable/main/binary-powerpc/caudium-php4_4.1.2-6_powerpc.deb stable/main/binary-powerpc/php4-imap_4.1.2-6_powerpc.deb stable/main/binary-i386/php4-mhash_4.1.2-6_i386.deb php4 (4:4.1.2-6) stable; urgency=low * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions from glibc, as they are broken on many architectures in Debian. - The patch is an 8-line change that simply removes pread() and pwrite() calls in ext/session/mod_files.c - This should finally fix the "sessions don't work on $arch" bug (which was a serious regression between Potato and Woody), so people can stop following up to it. (closes: #121391) stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-xml_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-gd_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-magick_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-dev_3.0.18-23.1woody1_sparc.deb stable/main/binary-sparc/php3-imap_3.0.18-23.1woody1_sparc.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-s390/php3-dev_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-snmp_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-xml_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-ldap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-imap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-gd_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-mhash_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-mysql_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-magick_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody1_s390.deb stable/main/binary-s390/php3-cgi_3.0.18-23.1woody1_s390.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody1_powerpc.deb stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody1_powerpc.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody1_mipsel.deb stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody1_mipsel.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-mips/php3-gd_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-magick_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-imap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-ldap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-mhash_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-dev_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-snmp_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-xml_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-mysql_3.0.18-23.1woody1_mips.deb stable/main/binary-mips/php3-cgi_3.0.18-23.1woody1_mips.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-dev_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-imap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-xml_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-magick_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-gd_3.0.18-23.1woody1_m68k.deb stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody1_m68k.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-ia64/php3-dev_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-magick_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-imap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-gd_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-xml_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody1_ia64.deb stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody1_ia64.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-imap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-xml_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-dev_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-magick_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-gd_3.0.18-23.1woody1_hppa.deb stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody1_hppa.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-imap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-gd_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-ldap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-dev_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-xml_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-mysql_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-mhash_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-magick_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-snmp_3.0.18-23.1woody1_arm.deb stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody1_arm.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-magick_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-xml_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-imap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-gd_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-dev_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3_3.0.18-23.1woody1_alpha.deb stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody1_alpha.deb php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-i386/php3-dev_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-ldap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-xml_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-mysql_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody1_i386.deb stable/main/source/php3_3.0.18-23.1woody1.dsc stable/main/binary-all/php3-doc_3.0.18-23.1woody1_all.deb stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-mhash_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-imap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-gd_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-magick_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody1_i386.deb stable/main/binary-i386/php3-snmp_3.0.18-23.1woody1_i386.deb stable/main/source/php3_3.0.18-23.1woody1.diff.gz php3 (3:3.0.18-23.1woody1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport security fixes from 4.2.3+ to stop CR/LF injection - Strip control characters from To and Subject fields in mail() - Strip control characters from URLs in fopen() stable/main/binary-i386/pcmcia-modules-2.2.22_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22. stable/main/binary-i386/pcmcia-modules-2.2.22-idepci_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22-idepci. stable/main/binary-i386/pcmcia-modules-2.2.22-compact_3.1.33-6k1_i386.deb pcmcia-cs (3.1.33-6) unstable; urgency=high * Built for kernel-image-2.2.22-compact. stable/main/binary-ia64/ssh_3.4p1-1_ia64.deb stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1_ia64.deb openssh (1:3.4p1-1) testing; urgency=high * Extend my tendrils back into this package (Closes: #150915, #151098) * thanks to the security team for their work * no thanks to ISS/Theo de Raadt for their handling of these bugs * save old sshd_configs to sshd_config.dpkg-old when auto-generating a new one * tell/ask the user about PriviledgeSeparation * /etc/init.d/ssh run will now create the chroot empty dir if necessary * Remove our previous statoverride on /usr/bin/ssh (only for people upgrading from a version where we'd put one in ourselves!) * Stop slandering Russia, since someone asked so nicely (Closes: #148951) * Reduce the sleep time in /etc/init.d/ssh during a restart stable/main/binary-sparc/openafs-fileserver_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-dbserver_1.2.3final2-6_sparc.deb stable/main/binary-sparc/libopenafs-dev_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-kpasswd_1.2.3final2-6_sparc.deb stable/main/binary-sparc/openafs-client_1.2.3final2-6_sparc.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-s390/libopenafs-dev_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-fileserver_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-kpasswd_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-dbserver_1.2.3final2-6_s390.deb stable/main/binary-s390/openafs-client_1.2.3final2-6_s390.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-powerpc/openafs-kpasswd_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-client_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-dbserver_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/openafs-fileserver_1.2.3final2-6_powerpc.deb stable/main/binary-powerpc/libopenafs-dev_1.2.3final2-6_powerpc.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-alpha/openafs-dbserver_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-fileserver_1.2.3final2-6_alpha.deb stable/main/binary-alpha/libopenafs-dev_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-client_1.2.3final2-6_alpha.deb stable/main/binary-alpha/openafs-kpasswd_1.2.3final2-6_alpha.deb openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-i386/openafs-fileserver_1.2.3final2-6_i386.deb stable/main/binary-i386/libopenafs-dev_1.2.3final2-6_i386.deb stable/main/binary-i386/openafs-dbserver_1.2.3final2-6_i386.deb stable/main/binary-i386/openafs-kpasswd_1.2.3final2-6_i386.deb stable/main/source/openafs_1.2.3final2-6.dsc stable/main/binary-all/openafs-modules-source_1.2.3final2-6_all.deb stable/main/binary-i386/openafs-client_1.2.3final2-6_i386.deb stable/main/source/openafs_1.2.3final2-6.diff.gz openafs (1.2.3final2-6) stable-security; urgency=high * Security problem: fix XDR buffer overflow based on upstream advisory. stable/main/binary-sparc/octave2.1_2.1.35-7woody1_sparc.deb stable/main/binary-sparc/octave2.1-headers_2.1.35-7woody1_sparc.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-s390/octave2.1-headers_2.1.35-7woody1_s390.deb stable/main/binary-s390/octave2.1_2.1.35-7woody1_s390.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-powerpc/octave2.1_2.1.35-7woody1_powerpc.deb stable/main/binary-powerpc/octave2.1-headers_2.1.35-7woody1_powerpc.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-mipsel/octave2.1_2.1.35-7woody1_mipsel.deb stable/main/binary-mipsel/octave2.1-headers_2.1.35-7woody1_mipsel.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-mips/octave2.1-headers_2.1.35-7woody1_mips.deb stable/main/binary-mips/octave2.1_2.1.35-7woody1_mips.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-m68k/octave2.1_2.1.35-7woody1_m68k.deb stable/main/binary-m68k/octave2.1-headers_2.1.35-7woody1_m68k.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-ia64/octave2.1_2.1.35-7woody1_ia64.deb stable/main/binary-ia64/octave2.1-headers_2.1.35-7woody1_ia64.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-hppa/octave2.1-headers_2.1.35-7woody1_hppa.deb stable/main/binary-hppa/octave2.1_2.1.35-7woody1_hppa.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-alpha/octave2.1-headers_2.1.35-7woody1_alpha.deb stable/main/binary-alpha/octave2.1_2.1.35-7woody1_alpha.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-i386/octave2.1_2.1.35-7woody1_i386.deb stable/main/source/octave2.1_2.1.35-7woody1.dsc stable/main/binary-all/octave2.1-htmldoc_2.1.35-7woody1_all.deb stable/main/binary-i386/octave2.1-headers_2.1.35-7woody1_i386.deb stable/main/binary-all/octave2.1-info_2.1.35-7woody1_all.deb stable/main/binary-all/octave2.1-emacsen_2.1.35-7woody1_all.deb stable/main/source/octave2.1_2.1.35-7woody1.diff.gz stable/main/binary-all/octave2.1-doc_2.1.35-7woody1_all.deb octave2.1 (2.1.35-7woody1) stable; urgency=medium * Rebuilt against current atlas*-dev package with corrected shlibs.default to ensure proper handling of virtual depends on blas2 with default of blas and atlas2-base * Applied Debian changes made since Debian 3.0 froze: - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under the correct function label of octave-help (from 2.1.36-5) - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5) - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4) - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3) - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3) - debian/control: Build-Depends on texi2html (2.1.36-1) * And strictly no new upstream code making this a stable release stable/main/binary-sparc/ocaml_3.04-14_sparc.deb stable/main/binary-sparc/ocaml-native-compilers_3.04-14_sparc.deb stable/main/binary-sparc/ocaml-base_3.04-14_sparc.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-s390/ocaml-base_3.04-14_s390.deb stable/main/binary-s390/ocaml_3.04-14_s390.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-powerpc/ocaml-native-compilers_3.04-14_powerpc.deb stable/main/binary-powerpc/ocaml_3.04-14_powerpc.deb stable/main/binary-powerpc/ocaml-base_3.04-14_powerpc.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-mipsel/ocaml-base_3.04-14_mipsel.deb stable/main/binary-mipsel/ocaml_3.04-14_mipsel.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-mips/ocaml-base_3.04-14_mips.deb stable/main/binary-mips/ocaml_3.04-14_mips.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-m68k/ocaml_3.04-14_m68k.deb stable/main/binary-m68k/ocaml-base_3.04-14_m68k.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-ia64/ocaml-base_3.04-14_ia64.deb stable/main/binary-ia64/ocaml_3.04-14_ia64.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-i386/ocaml-base_3.04-14_i386.deb stable/main/binary-i386/ocaml-native-compilers_3.04-14_i386.deb stable/main/binary-i386/ocaml_3.04-14_i386.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-hppa/ocaml-base_3.04-14_hppa.deb stable/main/binary-hppa/ocaml_3.04-14_hppa.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-arm/ocaml_3.04-14_arm.deb stable/main/binary-arm/ocaml-base_3.04-14_arm.deb stable/main/binary-arm/ocaml-native-compilers_3.04-14_arm.deb ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-all/ocaml-source_3.04-14_all.deb stable/main/source/ocaml_3.04-14.diff.gz stable/main/binary-alpha/ocaml-base_3.04-14_alpha.deb stable/main/binary-alpha/ocaml_3.04-14_alpha.deb stable/main/binary-alpha/ocaml-native-compilers_3.04-14_alpha.deb stable/main/source/ocaml_3.04-14.dsc ocaml (3.04-14) stable; urgency=high * Fixed postinst-ocamlld so it will now do its work also when upgrading a package, and not only when removing it. stable/main/binary-s390/nullmailer_1.00RC5-16.1woody2_s390.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-powerpc/nullmailer_1.00RC5-16.1woody2_powerpc.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-mipsel/nullmailer_1.00RC5-16.1woody2_mipsel.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-mips/nullmailer_1.00RC5-16.1woody2_mips.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-m68k/nullmailer_1.00RC5-16.1woody2_m68k.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-ia64/nullmailer_1.00RC5-16.1woody2_ia64.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-i386/nullmailer_1.00RC5-16.1woody2_i386.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-hppa/nullmailer_1.00RC5-16.1woody2_hppa.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-arm/nullmailer_1.00RC5-16.1woody2_arm.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-alpha/nullmailer_1.00RC5-16.1woody2_alpha.deb nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-sparc/nullmailer_1.00RC5-16.1woody2_sparc.deb stable/main/source/nullmailer_1.00RC5-16.1woody2.diff.gz stable/main/source/nullmailer_1.00RC5-16.1woody2.dsc nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high * Security fix, prevents possible denial of service attack, closes: #160127. * Security fix, corrected spooldir permissions. * Set new maintainer in debian/control. stable/main/binary-s390/nis_3.9-6.1_s390.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-powerpc/nis_3.9-6.1_powerpc.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-mipsel/nis_3.9-6.1_mipsel.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-mips/nis_3.9-6.1_mips.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-m68k/nis_3.9-6.1_m68k.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-ia64/nis_3.9-6.1_ia64.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-i386/nis_3.9-6.1_i386.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-hppa/nis_3.9-6.1_hppa.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-arm/nis_3.9-6.1_arm.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-alpha/nis_3.9-6.1_alpha.deb nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-sparc/nis_3.9-6.1_sparc.deb stable/main/source/nis_3.9-6.1.dsc stable/main/source/nis_3.9-6.1.diff.gz nis (3.9-6.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied fix by Thorsten Kukuk to fix an information leak stable/main/binary-s390/libnessus-dev_1.0.10-2.0.1_s390.deb stable/main/binary-s390/libnessus1_1.0.10-2.0.1_s390.deb nessus-libraries (1.0.10-2.0.1) stable; urgency=low * Binary NMU to get rid of the libgmp3 library name, so that nessus-core builds. stable/main/binary-s390/nessusd_1.0.10-2.0.1_s390.deb stable/main/binary-s390/nessus_1.0.10-2.0.1_s390.deb nessus-core (1.0.10-2.0.1) stable; urgency=low * Binary NMU to get rid of the libgmp3 library name using a rebuilt nessus-libraries package. stable/main/binary-powerpc/nessusd_1.0.10-2_powerpc.deb stable/main/binary-powerpc/nessus_1.0.10-2_powerpc.deb nessus-core (1.0.10-2) unstable; urgency=low * Moved to main. The only component of Nessus that needed non-US was an encryption layer library within the libnessus package. stable/main/binary-sparc/murasaki_0.5.4-2.1_sparc.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-s390/murasaki_0.5.4-2.1_s390.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-powerpc/murasaki_0.5.4-2.1_powerpc.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-mipsel/murasaki_0.5.4-2.1_mipsel.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-mips/murasaki_0.5.4-2.1_mips.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-m68k/murasaki_0.5.4-2.1_m68k.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-ia64/murasaki_0.5.4-2.1_ia64.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-hppa/murasaki_0.5.4-2.1_hppa.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-arm/murasaki_0.5.4-2.1_arm.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-alpha/murasaki_0.5.4-2.1_alpha.deb murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/source/murasaki_0.5.4-2.1.diff.gz stable/main/binary-i386/murasaki_0.5.4-2.1_i386.deb stable/main/source/murasaki_0.5.4-2.1.dsc murasaki (0.5.4-2.1) stable; urgency=low * NMU * Init script now exists silently if hotplug isn't supported by the kernel (closes: #150615) stable/main/binary-sparc/muddleftpd_1.3.11-7woody2_sparc.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-s390/muddleftpd_1.3.11-7woody2_s390.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-powerpc/muddleftpd_1.3.11-7woody2_powerpc.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-mipsel/muddleftpd_1.3.11-7woody2_mipsel.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-mips/muddleftpd_1.3.11-7woody2_mips.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-m68k/muddleftpd_1.3.11-7woody2_m68k.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-ia64/muddleftpd_1.3.11-7woody2_ia64.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-hppa/muddleftpd_1.3.11-7woody2_hppa.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-arm/muddleftpd_1.3.11-7woody2_arm.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/binary-alpha/muddleftpd_1.3.11-7woody2_alpha.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/main/source/muddleftpd_1.3.11-7woody2.diff.gz stable/main/source/muddleftpd_1.3.11-7woody2.dsc stable/main/binary-i386/muddleftpd_1.3.11-7woody2_i386.deb muddleftpd (1.3.11-7woody2) stable-security; urgency=low * Another fix for the logfile, "backported" from upstream 1.3.12.1. stable/contrib/source/msttcorefonts_1.0.2.tar.gz stable/contrib/binary-all/msttcorefonts_1.0.2_all.deb stable/contrib/source/msttcorefonts_1.0.2.dsc msttcorefonts (1.0.2) stable; urgency=low * change base URL, Closes: #165926 stable/main/binary-s390/mpqc_2.0.4-1.1_s390.deb stable/main/binary-s390/libsc2_2.0.4-1.1_s390.deb stable/main/binary-s390/libsc-dev_2.0.4-1.1_s390.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-powerpc/mpqc_2.0.4-1.1_powerpc.deb stable/main/binary-powerpc/libsc2_2.0.4-1.1_powerpc.deb stable/main/binary-powerpc/libsc-dev_2.0.4-1.1_powerpc.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-m68k/libsc-dev_2.0.4-1.1_m68k.deb stable/main/binary-m68k/mpqc_2.0.4-1.1_m68k.deb stable/main/binary-m68k/libsc2_2.0.4-1.1_m68k.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-ia64/libsc-dev_2.0.4-1.1_ia64.deb stable/main/binary-ia64/mpqc_2.0.4-1.1_ia64.deb stable/main/binary-ia64/libsc2_2.0.4-1.1_ia64.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-i386/libsc2_2.0.4-1.1_i386.deb stable/main/binary-i386/libsc-dev_2.0.4-1.1_i386.deb stable/main/binary-i386/mpqc_2.0.4-1.1_i386.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-hppa/libsc2_2.0.4-1.1_hppa.deb stable/main/binary-hppa/libsc-dev_2.0.4-1.1_hppa.deb stable/main/binary-hppa/mpqc_2.0.4-1.1_hppa.deb mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-sparc/libsc2_2.0.4-1.1_sparc.deb stable/main/binary-sparc/libsc-dev_2.0.4-1.1_sparc.deb stable/main/source/mpqc_2.0.4-1.1.diff.gz stable/main/binary-all/libsc-doc_2.0.4-1.1_all.deb stable/main/binary-sparc/mpqc_2.0.4-1.1_sparc.deb stable/main/source/mpqc_2.0.4-1.1.dsc mpqc (2.0.4-1.1) stable; urgency=medium * Non-maintainer upload by stable release manager * Rebuilt against current atlas-dev from stable to fix broken dependencies * Applied patch from Rick Younie to fix build problems on m68k (see Bug#146040) * No code changes stable/main/binary-sparc/mpack_1.5-7woody2_sparc.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-s390/mpack_1.5-7woody2_s390.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-powerpc/mpack_1.5-7woody2_powerpc.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-mipsel/mpack_1.5-7woody2_mipsel.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-mips/mpack_1.5-7woody2_mips.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-ia64/mpack_1.5-7woody2_ia64.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-i386/mpack_1.5-7woody2_i386.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-hppa/mpack_1.5-7woody2_hppa.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-arm/mpack_1.5-7woody2_arm.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-alpha/mpack_1.5-7woody2_alpha.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/source/mpack_1.5-7woody2.diff.gz stable/main/source/mpack_1.5-7woody2.dsc stable/main/binary-m68k/mpack_1.5-7woody2_m68k.deb mpack (1.5-7woody2) stable-security; urgency=high * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1) * Do not accept disposition filenames like "../a". Security impact is limited because only a single leading "../" was accepted. (reported by Herbert Xu) stable/main/binary-s390/libmm11-dev_1.1.3-6.1_s390.deb stable/main/binary-s390/libmm11_1.1.3-6.1_s390.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-powerpc/libmm11_1.1.3-6.1_powerpc.deb stable/main/binary-powerpc/libmm11-dev_1.1.3-6.1_powerpc.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-mipsel/libmm11-dev_1.1.3-6.1_mipsel.deb stable/main/binary-mipsel/libmm11_1.1.3-6.1_mipsel.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-mips/libmm11-dev_1.1.3-6.1_mips.deb stable/main/binary-mips/libmm11_1.1.3-6.1_mips.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-m68k/libmm11_1.1.3-6.1_m68k.deb stable/main/binary-m68k/libmm11-dev_1.1.3-6.1_m68k.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-ia64/libmm11-dev_1.1.3-6.1_ia64.deb stable/main/binary-ia64/libmm11_1.1.3-6.1_ia64.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-i386/libmm11_1.1.3-6.1_i386.deb stable/main/binary-i386/libmm11-dev_1.1.3-6.1_i386.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-hppa/libmm11-dev_1.1.3-6.1_hppa.deb stable/main/binary-hppa/libmm11_1.1.3-6.1_hppa.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-arm/libmm11-dev_1.1.3-6.1_arm.deb stable/main/binary-arm/libmm11_1.1.3-6.1_arm.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/binary-alpha/libmm11-dev_1.1.3-6.1_alpha.deb stable/main/binary-alpha/libmm11_1.1.3-6.1_alpha.deb mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/source/mm_1.1.3-6.1.dsc stable/main/binary-sparc/libmm11-dev_1.1.3-6.1_sparc.deb stable/main/binary-sparc/libmm11_1.1.3-6.1_sparc.deb stable/main/source/mm_1.1.3-6.1.diff.gz mm (1.1.3-6.1) stable-security; urgency=high * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE Security, that fixes a temporary file race condition, i.e. insecure creation of temporary files in a publically writable directory. stable/main/source/mhonarc_2.5.2-1.2.diff.gz stable/main/source/mhonarc_2.5.2-1.2.dsc stable/main/binary-all/mhonarc_2.5.2-1.2_all.deb mhonarc (2.5.2-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Make sure to htmlize name parameter to avoid any potential XSS. (upstream) * XSS vulnerability with message header fields fixed: Message header field names were not escaped during conversion to HTML. Hence, an attacker could including scripting markup in the message header. (upstream) stable/main/binary-s390/masqmail_0.1.16-2.1_s390.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-powerpc/masqmail_0.1.16-2.1_powerpc.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-mipsel/masqmail_0.1.16-2.1_mipsel.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-mips/masqmail_0.1.16-2.1_mips.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-m68k/masqmail_0.1.16-2.1_m68k.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-ia64/masqmail_0.1.16-2.1_ia64.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-i386/masqmail_0.1.16-2.1_i386.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-hppa/masqmail_0.1.16-2.1_hppa.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-arm/masqmail_0.1.16-2.1_arm.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-alpha/masqmail_0.1.16-2.1_alpha.deb masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/source/masqmail_0.1.16-2.1.diff.gz stable/main/binary-sparc/masqmail_0.1.16-2.1_sparc.deb stable/main/source/masqmail_0.1.16-2.1.dsc masqmail (0.1.16-2.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream fixes to several buffer overflows stable/main/binary-all/mantis_0.17.1-2.5_all.deb stable/main/source/mantis_0.17.1-2.5.diff.gz stable/main/source/mantis_0.17.1-2.5.dsc mantis (0.17.1-2.5) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream changes to fix privilege escalation with private bugs (Mantis Advisory/2002-06) * Applied upstream changes to privilege escalation when no projects are accessable to the user (Mantis Advisory/2002-07) * Applied upstream fixes to fix the problem that Mantis ignores settings here and there (Mantis Advisory/2002-08) * Removed whitespace at the end of core_user_API.php (closes: Bug#159369) * Modified patches and files so dpkg-source doesn't complain about missing newlines anymore, gnarf. stable/main/binary-s390/mailman_2.0.11-1woody5_s390.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-powerpc/mailman_2.0.11-1woody5_powerpc.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-mipsel/mailman_2.0.11-1woody5_mipsel.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-mips/mailman_2.0.11-1woody5_mips.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-m68k/mailman_2.0.11-1woody5_m68k.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-ia64/mailman_2.0.11-1woody5_ia64.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-i386/mailman_2.0.11-1woody5_i386.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-hppa/mailman_2.0.11-1woody5_hppa.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-arm/mailman_2.0.11-1woody5_arm.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/binary-alpha/mailman_2.0.11-1woody5_alpha.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/source/mailman_2.0.11-1woody5.dsc stable/main/source/mailman_2.0.11-1woody5.diff.gz stable/main/binary-sparc/mailman_2.0.11-1woody5_sparc.deb mailman (2.0.11-1woody5) stable; urgency=medium * Non-maintainer upload by stable release manager * Fixed permissions on /var/lock/mailman which rendered the package in stable unusable stable/main/source/luxman_0.41-17.1.diff.gz stable/main/binary-i386/luxman_0.41-17.1_i386.deb stable/main/source/luxman_0.41-17.1.dsc luxman (0.41-17.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Use the full path for gzip to fix local root exploit in maped. Thanks to iDEFENSE for reporting this. stable/main/binary-sparc/logtool_1.0.6-7.woody.1_sparc.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-s390/logtool_1.0.6-7.woody.1_s390.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-powerpc/logtool_1.0.6-7.woody.1_powerpc.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-mipsel/logtool_1.0.6-7.woody.1_mipsel.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-mips/logtool_1.0.6-7.woody.1_mips.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-m68k/logtool_1.0.6-7.woody.1_m68k.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-ia64/logtool_1.0.6-7.woody.1_ia64.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-hppa/logtool_1.0.6-7.woody.1_hppa.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-arm/logtool_1.0.6-7.woody.1_arm.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-alpha/logtool_1.0.6-7.woody.1_alpha.deb logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-i386/logtool_1.0.6-7.woody.1_i386.deb stable/main/source/logtool_1.0.6-7.woody.1.dsc stable/main/source/logtool_1.0.6-7.woody.1.diff.gz logtool (1.0.6-7.woody.1) stable; urgency=low * Backported fix for file-existence-error bug from unstable version. (Closes: #153414). Release manager: this is just a one-character change from 'test -f' to 'test -L', where the latter is the right thing to do, is being done so for the other three cases, and works as is for a few months now in unstable stable/main/binary-s390/log2mail_0.2.5.1_s390.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-powerpc/log2mail_0.2.5.1_powerpc.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-mipsel/log2mail_0.2.5.1_mipsel.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-mips/log2mail_0.2.5.1_mips.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-m68k/log2mail_0.2.5.1_m68k.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-ia64/log2mail_0.2.5.1_ia64.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-i386/log2mail_0.2.5.1_i386.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-hppa/log2mail_0.2.5.1_hppa.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-arm/log2mail_0.2.5.1_arm.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-alpha/log2mail_0.2.5.1_alpha.deb log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-sparc/log2mail_0.2.5.1_sparc.deb stable/main/source/log2mail_0.2.5.1.dsc stable/main/source/log2mail_0.2.5.1.tar.gz log2mail (0.2.5.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed two potential buffer overflows stable/main/binary-sparc/libquota-perl_1.4.1-2_sparc.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-s390/libquota-perl_1.4.1-2_s390.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-powerpc/libquota-perl_1.4.1-2_powerpc.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-mipsel/libquota-perl_1.4.1-2_mipsel.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-mips/libquota-perl_1.4.1-2_mips.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-m68k/libquota-perl_1.4.1-2_m68k.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-ia64/libquota-perl_1.4.1-2_ia64.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-hppa/libquota-perl_1.4.1-2_hppa.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-arm/libquota-perl_1.4.1-2_arm.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-alpha/libquota-perl_1.4.1-2_alpha.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/source/libquota-perl_1.4.1-2.dsc stable/main/source/libquota-perl_1.4.1-2.diff.gz stable/main/binary-i386/libquota-perl_1.4.1-2_i386.deb libquota-perl (1.4.1-2) stable; urgency=high * Backported change for C code from unstable version (1.4.6) to fix major brokenness (Closes: #162385) stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.2_s390.deb stable/main/binary-s390/libpng2_1.0.12-3.woody.2_s390.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.2_powerpc.deb stable/main/binary-powerpc/libpng2_1.0.12-3.woody.2_powerpc.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.2_mipsel.deb stable/main/binary-mipsel/libpng2_1.0.12-3.woody.2_mipsel.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.2_mips.deb stable/main/binary-mips/libpng2_1.0.12-3.woody.2_mips.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-m68k/libpng2_1.0.12-3.woody.2_m68k.deb stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.2_m68k.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.2_ia64.deb stable/main/binary-ia64/libpng2_1.0.12-3.woody.2_ia64.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-i386/libpng2_1.0.12-3.woody.2_i386.deb stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.2_i386.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.2_hppa.deb stable/main/binary-hppa/libpng2_1.0.12-3.woody.2_hppa.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-arm/libpng2_1.0.12-3.woody.2_arm.deb stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.2_arm.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-alpha/libpng2_1.0.12-3.woody.2_alpha.deb stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.2_alpha.deb libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/source/libpng_1.0.12-3.woody.2.diff.gz stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.2_sparc.deb stable/main/binary-sparc/libpng2_1.0.12-3.woody.2_sparc.deb stable/main/source/libpng_1.0.12-3.woody.2.dsc libpng (1.0.12-3.woody.2) stable-security; urgency=high * Applied security related patch Glenn Randers-Pehrson informed us about, which preserves libpng from processing too wide images. stable/main/binary-all/libgnupg-perl_0.9-1.woody.1_all.deb stable/main/source/libgnupg-perl_0.9-1.woody.1.diff.gz stable/main/source/libgnupg-perl_0.9-1.woody.1.dsc libgnupg-perl (0.9-1.woody.1) stable; urgency=low * Upload to stable (for woody r1). * Moved from non-US to main (Section: interpreters). (apart from the changelog this package is identical to 0.9-2) stable/main/binary-sparc/libgd-dev_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd1_1.8.4-17.woody2_sparc.deb stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody2_sparc.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd1_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody2_s390.deb stable/main/binary-s390/libgd-dev_1.8.4-17.woody2_s390.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-powerpc/libgd1_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody2_powerpc.deb stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody2_powerpc.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd1_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody2_mipsel.deb stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody2_mipsel.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd1_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody2_mips.deb stable/main/binary-mips/libgd-dev_1.8.4-17.woody2_mips.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-m68k/libgd1_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd-dev_1.8.4-17.woody2_m68k.deb stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody2_m68k.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd1_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd-dev_1.8.4-17.woody2_ia64.deb stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody2_ia64.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-hppa/libgd1_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd-dev_1.8.4-17.woody2_hppa.deb stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody2_hppa.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd1_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd-dev_1.8.4-17.woody2_arm.deb stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody2_arm.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-alpha/libgd1_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody2_alpha.deb stable/main/binary-alpha/libgd-dev_1.8.4-17.woody2_alpha.deb libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-i386/libgd-dev_1.8.4-17.woody2_i386.deb stable/main/source/libgd_1.8.4-17.woody2.dsc stable/main/binary-i386/libgd1_1.8.4-17.woody2_i386.deb stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody2_i386.deb stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody2_i386.deb stable/main/source/libgd_1.8.4-17.woody2.diff.gz libgd (1.8.4-17.woody2) stable; urgency=low * Rebuild on woody (closes: bug#160739). stable/main/binary-sparc/l2tpd_0.67-1.1_sparc.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-s390/l2tpd_0.67-1.1_s390.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-powerpc/l2tpd_0.67-1.1_powerpc.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-mipsel/l2tpd_0.67-1.1_mipsel.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-mips/l2tpd_0.67-1.1_mips.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-ia64/l2tpd_0.67-1.1_ia64.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-i386/l2tpd_0.67-1.1_i386.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-hppa/l2tpd_0.67-1.1_hppa.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-arm/l2tpd_0.67-1.1_arm.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-alpha/l2tpd_0.67-1.1_alpha.deb l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/source/l2tpd_0.67-1.1.dsc stable/main/binary-m68k/l2tpd_0.67-1.1_m68k.deb stable/main/source/l2tpd_0.67-1.1.diff.gz l2tpd (0.67-1.1) stable-security; urgency=high * Seed rand() with time() at program startup * Fix some off by 6 errors in avp handling (included from 0.68) stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkrb53_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-user_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-kdc_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/krb5-clients_1.2.4-5woody3_sparc.deb stable/main/binary-sparc/libkadm55_1.2.4-5woody3_sparc.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-s390/libkrb5-dev_1.2.4-5woody3_s390.deb stable/main/binary-s390/libkadm55_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-ftpd_1.2.4-5woody3_s390.deb stable/main/binary-s390/libkrb53_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-user_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-admin-server_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-telnetd_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-kdc_1.2.4-5woody3_s390.deb stable/main/binary-s390/krb5-clients_1.2.4-5woody3_s390.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-user_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkrb53_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody3_powerpc.deb stable/main/binary-powerpc/libkadm55_1.2.4-5woody3_powerpc.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-mipsel/libkadm55_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/libkrb53_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-user_1.2.4-5woody3_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody3_mipsel.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-mips/libkrb53_1.2.4-5woody3_mips.deb stable/main/binary-mips/libkadm55_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-user_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-telnetd_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-admin-server_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-kdc_1.2.4-5woody3_mips.deb stable/main/binary-mips/libkrb5-dev_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-clients_1.2.4-5woody3_mips.deb stable/main/binary-mips/krb5-ftpd_1.2.4-5woody3_mips.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-m68k/krb5-user_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-kdc_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkadm55_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkrb53_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/krb5-clients_1.2.4-5woody3_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody3_m68k.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-ia64/libkadm55_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-user_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-clients_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/libkrb53_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-kdc_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody3_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody3_ia64.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-hppa/libkrb53_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-clients_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/libkadm55_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-user_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-kdc_1.2.4-5woody3_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody3_hppa.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-arm/krb5-telnetd_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkadm55_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-user_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-ftpd_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-kdc_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-admin-server_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkrb5-dev_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-clients_1.2.4-5woody3_arm.deb stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody3_arm.deb stable/main/binary-arm/libkrb53_1.2.4-5woody3_arm.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkadm55_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-kdc_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-user_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/krb5-clients_1.2.4-5woody3_alpha.deb stable/main/binary-alpha/libkrb53_1.2.4-5woody3_alpha.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/binary-i386/krb5-clients_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-admin-server_1.2.4-5woody3_i386.deb stable/main/binary-all/krb5-doc_1.2.4-5woody3_all.deb stable/main/source/krb5_1.2.4-5woody3.dsc stable/main/binary-i386/krb5-ftpd_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkrb5-dev_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkrb53_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody3_i386.deb stable/main/source/krb5_1.2.4-5woody3.diff.gz stable/main/binary-i386/krb5-telnetd_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-user_1.2.4-5woody3_i386.deb stable/main/binary-i386/krb5-kdc_1.2.4-5woody3_i386.deb stable/main/binary-i386/libkadm55_1.2.4-5woody3_i386.deb krb5 (1.2.4-5woody3) stable-security; urgency=high * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer overflow in network packet handling.. Fortunately this daemon is not run by default in the Debian packages but it is provided. stable/main/source/kernel-source-2.2.22_2.2.22-1.diff.gz stable/main/source/kernel-source-2.2.22_2.2.22.orig.tar.gz stable/main/binary-all/kernel-source-2.2.22_2.2.22-1_all.deb stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1_all.deb stable/main/source/kernel-source-2.2.22_2.2.22-1.dsc kernel-source-2.2.22 (2.2.22-1) stable unstable; urgency=low * New upstream release. * Disabled MCE on Pentiums by default (closes: #154589). stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody0_mips.deb stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody0_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.dsc stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0_all.deb stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody0_mips.deb stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.tar.gz stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody0_mips.deb kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody0) stable; urgency=low * actually 2.4.19-0.020911.2 recompiled for woody (rediffed against kernel-source-2.4.19-4) stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.diff.gz stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1_all.deb stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.dsc kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1) stable; urgency=high * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.06.12). This patch fixes the DASD deadlock problem and some other severe problems. * Removed NMU DASD deadlock fix. * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.08.16). This patch fixes a problem related to the IUCV driver. stable/main/binary-all/kernel-headers-2.4.19-sparc_26_all.deb stable/main/source/kernel-image-sparc-2.4_26.tar.gz stable/main/binary-sparc/kernel-image-2.4.19-sun4u_26_sparc.deb stable/main/source/kernel-image-sparc-2.4_26.dsc stable/main/binary-sparc/kernel-image-2.4.19-sun4u-smp_26_sparc.deb kernel-image-sparc-2.4 (26) stable; urgency=low * More patches from davem, to fix serious bugs. * Strip kernel image so it fits better (makes SILO and TILO happy) stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.1.1_s390.deb stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1_s390.deb stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.dsc stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.tar.gz kernel-image-2.4.17-s390 (2.4.17-2.woody.1.1) stable; urgency=high * NMU * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.06.12). This patch fixes the DASD deadlock problem and some other severe problems. * Removed NMU DASD deadlock fix. * Integrated a new kernel-patch from the IBM Developerworks website (released on 2002.08.16). This patch fixes a problem related to the IUCV driver. stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-1_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-1_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.dsc stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-1_alpha.deb stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.tar.gz stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-1_alpha.deb stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-1_alpha.deb kernel-image-2.2.22-alpha (2.2.22-1) stable unstable; urgency=low * New upstream release. stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.5_sparc.deb stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-s390/libarts_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libarts-dev_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.5_s390.deb stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.5_s390.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb stable/main/binary-powerpc/libkmid_2.2.2-13.woody.5_powerpc.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libkmid_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libarts_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.5_mips.deb stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.5_mips.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-m68k/libkmid_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts_2.2.2-13.woody.5_m68k.deb stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.5_m68k.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.5_ia64.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-i386/libarts_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libarts-dev_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.5_i386.deb stable/main/binary-i386/libkmid_2.2.2-13.woody.5_i386.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.5_hppa.deb stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.5_hppa.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libarts-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs3_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libarts_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.5_arm.deb stable/main/binary-arm/libkmid_2.2.2-13.woody.5_arm.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libarts_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.5_alpha.deb stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.5_alpha.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/source/kdelibs_2.2.2-13.woody.5.diff.gz stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.5_mipsel.deb stable/main/source/kdelibs_2.2.2-13.woody.5.dsc stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.5_all.deb stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libarts_2.2.2-13.woody.5_mipsel.deb stable/main/binary-mipsel/libkmid_2.2.2-13.woody.5_mipsel.deb kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second (or third, since the first one burnt together with satie and the entire building around it) injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/main/binary-s390/kamera_2.2.2-6.8_s390.deb stable/main/binary-s390/kcoloredit_2.2.2-6.8_s390.deb stable/main/binary-s390/libkscan-dev_2.2.2-6.8_s390.deb stable/main/binary-s390/kruler_2.2.2-6.8_s390.deb stable/main/binary-s390/kghostview_2.2.2-6.8_s390.deb stable/main/binary-s390/kpaint_2.2.2-6.8_s390.deb stable/main/binary-s390/kooka_2.2.2-6.8_s390.deb stable/main/binary-s390/libkscan1_2.2.2-6.8_s390.deb stable/main/binary-s390/ksnapshot_2.2.2-6.8_s390.deb stable/main/binary-s390/kiconedit_2.2.2-6.8_s390.deb stable/main/binary-s390/kfract_2.2.2-6.8_s390.deb stable/main/binary-s390/kview_2.2.2-6.8_s390.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-powerpc/kruler_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/libkscan1_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kamera_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kiconedit_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kghostview_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/ksnapshot_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/libkscan-dev_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kpaint_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kview_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kfract_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kcoloredit_2.2.2-6.8_powerpc.deb stable/main/binary-powerpc/kooka_2.2.2-6.8_powerpc.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-mipsel/kamera_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kfract_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kiconedit_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kruler_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/libkscan1_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kcoloredit_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kooka_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kpaint_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kghostview_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/ksnapshot_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/kview_2.2.2-6.8_mipsel.deb stable/main/binary-mipsel/libkscan-dev_2.2.2-6.8_mipsel.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk M|ller of KDE. stable/main/binary-mips/kamera_2.2.2-6.8_mips.deb stable/main/binary-mips/libkscan-dev_2.2.2-6.8_mips.deb stable/main/binary-mips/kghostview_2.2.2-6.8_mips.deb stable/main/binary-mips/kcoloredit_2.2.2-6.8_mips.deb stable/main/binary-mips/kpaint_2.2.2-6.8_mips.deb stable/main/binary-mips/kooka_2.2.2-6.8_mips.deb stable/main/binary-mips/ksnapshot_2.2.2-6.8_mips.deb stable/main/binary-mips/kfract_2.2.2-6.8_mips.deb stable/main/binary-mips/kiconedit_2.2.2-6.8_mips.deb stable/main/binary-mips/kruler_2.2.2-6.8_mips.deb stable/main/binary-mips/libkscan1_2.2.2-6.8_mips.deb stable/main/binary-mips/kview_2.2.2-6.8_mips.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-m68k/kcoloredit_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kview_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kamera_2.2.2-6.8_m68k.deb stable/main/binary-m68k/libkscan-dev_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kghostview_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kruler_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kfract_2.2.2-6.8_m68k.deb stable/main/binary-m68k/ksnapshot_2.2.2-6.8_m68k.deb stable/main/binary-m68k/libkscan1_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kooka_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kpaint_2.2.2-6.8_m68k.deb stable/main/binary-m68k/kiconedit_2.2.2-6.8_m68k.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-ia64/kooka_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kpaint_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kcoloredit_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kiconedit_2.2.2-6.8_ia64.deb stable/main/binary-ia64/libkscan-dev_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kghostview_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kamera_2.2.2-6.8_ia64.deb stable/main/binary-ia64/libkscan1_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kruler_2.2.2-6.8_ia64.deb stable/main/binary-ia64/ksnapshot_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kview_2.2.2-6.8_ia64.deb stable/main/binary-ia64/kfract_2.2.2-6.8_ia64.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-i386/kiconedit_2.2.2-6.8_i386.deb stable/main/binary-i386/kfract_2.2.2-6.8_i386.deb stable/main/binary-i386/libkscan1_2.2.2-6.8_i386.deb stable/main/binary-i386/kooka_2.2.2-6.8_i386.deb stable/main/binary-i386/kpaint_2.2.2-6.8_i386.deb stable/main/binary-i386/kghostview_2.2.2-6.8_i386.deb stable/main/binary-i386/libkscan-dev_2.2.2-6.8_i386.deb stable/main/binary-i386/ksnapshot_2.2.2-6.8_i386.deb stable/main/binary-i386/kruler_2.2.2-6.8_i386.deb stable/main/binary-i386/kcoloredit_2.2.2-6.8_i386.deb stable/main/binary-i386/kview_2.2.2-6.8_i386.deb stable/main/binary-i386/kamera_2.2.2-6.8_i386.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-hppa/kfract_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kamera_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kcoloredit_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kpaint_2.2.2-6.8_hppa.deb stable/main/binary-hppa/ksnapshot_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kghostview_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kview_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kruler_2.2.2-6.8_hppa.deb stable/main/binary-hppa/kiconedit_2.2.2-6.8_hppa.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-arm/kooka_2.2.2-6.8_arm.deb stable/main/binary-arm/libkscan1_2.2.2-6.8_arm.deb stable/main/binary-arm/ksnapshot_2.2.2-6.8_arm.deb stable/main/binary-arm/kpaint_2.2.2-6.8_arm.deb stable/main/binary-arm/kghostview_2.2.2-6.8_arm.deb stable/main/binary-arm/kcoloredit_2.2.2-6.8_arm.deb stable/main/binary-arm/kiconedit_2.2.2-6.8_arm.deb stable/main/binary-arm/kruler_2.2.2-6.8_arm.deb stable/main/binary-arm/libkscan-dev_2.2.2-6.8_arm.deb stable/main/binary-arm/kfract_2.2.2-6.8_arm.deb stable/main/binary-arm/kview_2.2.2-6.8_arm.deb stable/main/binary-arm/kamera_2.2.2-6.8_arm.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-alpha/kview_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kamera_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kghostview_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kruler_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kiconedit_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kooka_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kpaint_2.2.2-6.8_alpha.deb stable/main/binary-alpha/ksnapshot_2.2.2-6.8_alpha.deb stable/main/binary-alpha/libkscan-dev_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kcoloredit_2.2.2-6.8_alpha.deb stable/main/binary-alpha/libkscan1_2.2.2-6.8_alpha.deb stable/main/binary-alpha/kfract_2.2.2-6.8_alpha.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-sparc/libkscan-dev_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kfract_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kview_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kiconedit_2.2.2-6.8_sparc.deb stable/main/binary-sparc/ksnapshot_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kamera_2.2.2-6.8_sparc.deb stable/main/source/kdegraphics_2.2.2-6.8.dsc stable/main/binary-sparc/kcoloredit_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kruler_2.2.2-6.8_sparc.deb stable/main/source/kdegraphics_2.2.2-6.8.diff.gz stable/main/binary-sparc/kghostview_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kpaint_2.2.2-6.8_sparc.deb stable/main/binary-sparc/kooka_2.2.2-6.8_sparc.deb stable/main/binary-sparc/libkscan1_2.2.2-6.8_sparc.deb kdegraphics (4:2.2.2-6.8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Looks like I missed one more occurrence of sscanf(). Thanks to Dirk Müller of KDE. stable/main/binary-s390/irssi-text_0.8.4-3.1_s390.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-powerpc/irssi-text_0.8.4-3.1_powerpc.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-mipsel/irssi-text_0.8.4-3.1_mipsel.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-mips/irssi-text_0.8.4-3.1_mips.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-m68k/irssi-text_0.8.4-3.1_m68k.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-ia64/irssi-text_0.8.4-3.1_ia64.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-i386/irssi-text_0.8.4-3.1_i386.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-hppa/irssi-text_0.8.4-3.1_hppa.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-arm/irssi-text_0.8.4-3.1_arm.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-alpha/irssi-text_0.8.4-3.1_alpha.deb irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/source/irssi-text_0.8.4-3.1.diff.gz stable/main/binary-sparc/irssi-text_0.8.4-3.1_sparc.deb stable/main/source/irssi-text_0.8.4-3.1.dsc irssi-text (0.8.4-3.1) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to keep irssi from crashing on maliciously crafted topics stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.1_sparc.deb stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_sparc.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.1_s390.deb stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.1_s390.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.1_powerpc.deb stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.1_mipsel.deb stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.1_mips.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.1_m68k.deb stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.1_ia64.deb stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.1_hppa.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.1_arm.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.1_alpha.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/source/interchange_4.8.3.20020306-1.woody.1.dsc stable/main/source/interchange_4.8.3.20020306-1.woody.1.diff.gz stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.1_all.deb stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.1_i386.deb stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high * fixed possible remote access to local files readable by the Interchange daemon running in INET mode. stable/main/binary-all/initrd-tools_0.1.32woody.3_all.deb stable/main/source/initrd-tools_0.1.32woody.3.dsc stable/main/source/initrd-tools_0.1.32woody.3.tar.gz initrd-tools (0.1.32woody.3) stable; urgency=low * Depend on debhelper >= 3 (closes: #171364). stable/main/source/im_141-18.2.dsc stable/main/binary-all/im_141-18.2_all.deb stable/main/source/im_141-18.2.diff.gz im (1:141-18.2) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Fixed yafhci386 that turned out to be yafhc$build_arch stable/main/binary-s390/hylafax-server_4.1.1-1.1_s390.deb stable/main/binary-s390/hylafax-client_4.1.1-1.1_s390.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-powerpc/hylafax-server_4.1.1-1.1_powerpc.deb stable/main/binary-powerpc/hylafax-client_4.1.1-1.1_powerpc.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-m68k/hylafax-client_4.1.1-1.1_m68k.deb stable/main/binary-m68k/hylafax-server_4.1.1-1.1_m68k.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-ia64/hylafax-server_4.1.1-1.1_ia64.deb stable/main/binary-ia64/hylafax-client_4.1.1-1.1_ia64.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-i386/hylafax-server_4.1.1-1.1_i386.deb stable/main/binary-i386/hylafax-client_4.1.1-1.1_i386.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-hppa/hylafax-server_4.1.1-1.1_hppa.deb stable/main/binary-hppa/hylafax-client_4.1.1-1.1_hppa.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-arm/hylafax-client_4.1.1-1.1_arm.deb stable/main/binary-arm/hylafax-server_4.1.1-1.1_arm.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-alpha/hylafax-client_4.1.1-1.1_alpha.deb stable/main/binary-alpha/hylafax-server_4.1.1-1.1_alpha.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-all/hylafax-doc_4.1.1-1.1_all.deb stable/main/source/hylafax_4.1.1-1.1.diff.gz stable/main/source/hylafax_4.1.1-1.1.dsc stable/main/binary-sparc/hylafax-client_4.1.1-1.1_sparc.deb stable/main/binary-sparc/hylafax-server_4.1.1-1.1_sparc.deb hylafax (1:4.1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Backported secrurity fixes from 4.1.3: . Fixed hostname format string vulnerabilities in faxrm, faxstat, faxalter, sendfax, sendpage, faxfetch and faxwatch . Fixed a potential buffer overflow when copying TIF data . Fixed TSI format string vulnerability in faxgetty * Added a double cast so g++ will actually like the last backported fix stable/main/binary-hppa/htmldoc_1.8.17-2_hppa.deb htmldoc (1.8.17-2) woody-proposed-updates; urgency=high * Fixed bug in configure.in; --without-openssl-* wasn't recognized. Considered high priority because the previous version of htmldoc is linked against OpenSSL because of this bug, which is a violation of the GPL. stable/main/binary-all/html2ps_1.0b3-1.2_all.deb stable/main/source/html2ps_1.0b3-1.2.dsc stable/main/source/html2ps_1.0b3-1.2.diff.gz html2ps (1.0b3-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix a trivial syntax error introduced in 1.0b3-1.1 (Closes: #170272) stable/main/binary-s390/htcheck_1.1-1.1_s390.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-powerpc/htcheck_1.1-1.1_powerpc.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-mipsel/htcheck_1.1-1.1_mipsel.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-mips/htcheck_1.1-1.1_mips.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-m68k/htcheck_1.1-1.1_m68k.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-ia64/htcheck_1.1-1.1_ia64.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-i386/htcheck_1.1-1.1_i386.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-hppa/htcheck_1.1-1.1_hppa.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-arm/htcheck_1.1-1.1_arm.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-alpha/htcheck_1.1-1.1_alpha.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-sparc/htcheck_1.1-1.1_sparc.deb stable/main/source/htcheck_1.1-1.1.dsc stable/main/source/htcheck_1.1-1.1.diff.gz stable/main/binary-all/htcheck-php_1.1-1.1_all.deb htcheck (1:1.1-1.1) stable-security; urgency=high * Non-maintainer upload by security team * Added get_html_entities() to return characters that need to be replaced in order to avoid a cross site scripting problem * Added implementation of WriteHTML() by weasel * Applied upstream patch to avoid unintended code execution through uninitialized variables * Applied upstream patch on the use of WriteHTML() stable/main/binary-s390/libstonith0_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/libstonith-dev_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/heartbeat_0.4.9.0l-7.2_s390.deb stable/main/binary-s390/stonith_0.4.9.0l-7.2_s390.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-powerpc/stonith_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/libstonith-dev_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/heartbeat_0.4.9.0l-7.2_powerpc.deb stable/main/binary-powerpc/libstonith0_0.4.9.0l-7.2_powerpc.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-mipsel/libstonith-dev_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/heartbeat_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/libstonith0_0.4.9.0l-7.2_mipsel.deb stable/main/binary-mipsel/stonith_0.4.9.0l-7.2_mipsel.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-mips/libstonith0_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/stonith_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/heartbeat_0.4.9.0l-7.2_mips.deb stable/main/binary-mips/libstonith-dev_0.4.9.0l-7.2_mips.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-m68k/heartbeat_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/stonith_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/libstonith0_0.4.9.0l-7.2_m68k.deb stable/main/binary-m68k/libstonith-dev_0.4.9.0l-7.2_m68k.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-ia64/stonith_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/libstonith0_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/heartbeat_0.4.9.0l-7.2_ia64.deb stable/main/binary-ia64/libstonith-dev_0.4.9.0l-7.2_ia64.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-i386/libstonith-dev_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/heartbeat_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/stonith_0.4.9.0l-7.2_i386.deb stable/main/binary-i386/libstonith0_0.4.9.0l-7.2_i386.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-hppa/libstonith0_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/stonith_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/heartbeat_0.4.9.0l-7.2_hppa.deb stable/main/binary-hppa/libstonith-dev_0.4.9.0l-7.2_hppa.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-arm/libstonith0_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/heartbeat_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/stonith_0.4.9.0l-7.2_arm.deb stable/main/binary-arm/libstonith-dev_0.4.9.0l-7.2_arm.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-alpha/libstonith-dev_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/libstonith0_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/stonith_0.4.9.0l-7.2_alpha.deb stable/main/binary-alpha/heartbeat_0.4.9.0l-7.2_alpha.deb heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-sparc/heartbeat_0.4.9.0l-7.2_sparc.deb stable/main/binary-all/ldirectord_0.4.9.0l-7.2_all.deb stable/main/binary-sparc/stonith_0.4.9.0l-7.2_sparc.deb stable/main/source/heartbeat_0.4.9.0l-7.2.diff.gz stable/main/binary-sparc/libstonith0_0.4.9.0l-7.2_sparc.deb stable/main/binary-sparc/libstonith-dev_0.4.9.0l-7.2_sparc.deb stable/main/source/heartbeat_0.4.9.0l-7.2.dsc heartbeat (0.4.9.0l-7.2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed several buffer overflows found by Nathan Wallwork. stable/main/binary-s390/gv_3.5.8-26.1_s390.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-powerpc/gv_3.5.8-26.1_powerpc.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-mipsel/gv_3.5.8-26.1_mipsel.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-mips/gv_3.5.8-26.1_mips.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-m68k/gv_3.5.8-26.1_m68k.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-ia64/gv_3.5.8-26.1_ia64.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-i386/gv_3.5.8-26.1_i386.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-hppa/gv_3.5.8-26.1_hppa.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-arm/gv_3.5.8-26.1_arm.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-alpha/gv_3.5.8-26.1_alpha.deb gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/source/gv_3.5.8-26.1.diff.gz stable/main/binary-sparc/gv_3.5.8-26.1_sparc.deb stable/main/source/gv_3.5.8-26.1.dsc gv (1:3.5.8-26.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply patch from Olaf Kirch to fix buffer overflows stable/main/binary-sparc/gtetrinet_0.4.1-9woody1.1_sparc.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-s390/gtetrinet_0.4.1-9woody1.1_s390.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-powerpc/gtetrinet_0.4.1-9woody1.1_powerpc.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-mipsel/gtetrinet_0.4.1-9woody1.1_mipsel.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-mips/gtetrinet_0.4.1-9woody1.1_mips.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-m68k/gtetrinet_0.4.1-9woody1.1_m68k.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-ia64/gtetrinet_0.4.1-9woody1.1_ia64.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-hppa/gtetrinet_0.4.1-9woody1.1_hppa.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-arm/gtetrinet_0.4.1-9woody1.1_arm.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/binary-alpha/gtetrinet_0.4.1-9woody1.1_alpha.deb gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends stable/main/source/gtetrinet_0.4.1-9woody1.1.dsc stable/main/binary-i386/gtetrinet_0.4.1-9woody1.1_i386.deb stable/main/source/gtetrinet_0.4.1-9woody1.1.diff.gz gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high * Rebuild by security team since source-only uploads are not supported * Update Build-Depends gtetrinet (0.4.1-9woody1) stable-security; urgency=HIGH * Apply patch from James Antill to fix multiple buffer overflows (Buqtraq ID: 6062). stable/main/binary-sparc/gnome-pim-conduits_1.4.6-1woody1_sparc.deb stable/main/binary-sparc/gnome-pim_1.4.6-1woody1_sparc.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-s390/gnome-pim-conduits_1.4.6-1woody1_s390.deb stable/main/binary-s390/gnome-pim_1.4.6-1woody1_s390.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-powerpc/gnome-pim_1.4.6-1woody1_powerpc.deb stable/main/binary-powerpc/gnome-pim-conduits_1.4.6-1woody1_powerpc.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-mipsel/gnome-pim-conduits_1.4.6-1woody1_mipsel.deb stable/main/binary-mipsel/gnome-pim_1.4.6-1woody1_mipsel.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-mips/gnome-pim-conduits_1.4.6-1woody1_mips.deb stable/main/binary-mips/gnome-pim_1.4.6-1woody1_mips.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-m68k/gnome-pim_1.4.6-1woody1_m68k.deb stable/main/binary-m68k/gnome-pim-conduits_1.4.6-1woody1_m68k.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-ia64/gnome-pim-conduits_1.4.6-1woody1_ia64.deb stable/main/binary-ia64/gnome-pim_1.4.6-1woody1_ia64.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-hppa/gnome-pim-conduits_1.4.6-1woody1_hppa.deb stable/main/binary-hppa/gnome-pim_1.4.6-1woody1_hppa.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-arm/gnome-pim_1.4.6-1woody1_arm.deb stable/main/binary-arm/gnome-pim-conduits_1.4.6-1woody1_arm.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-alpha/gnome-pim_1.4.6-1woody1_alpha.deb stable/main/binary-alpha/gnome-pim-conduits_1.4.6-1woody1_alpha.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-i386/gnome-pim_1.4.6-1woody1_i386.deb stable/main/source/gnome-pim_1.4.6-1woody1.diff.gz stable/main/source/gnome-pim_1.4.6-1woody1.dsc stable/main/binary-i386/gnome-pim-conduits_1.4.6-1woody1_i386.deb gnome-pim (1.4.6-1woody1) stable; urgency=low * Recompiled on woody. stable/main/binary-s390/gnome-gv_1.1.96-3.1_s390.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-powerpc/gnome-gv_1.1.96-3.1_powerpc.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-mipsel/gnome-gv_1.1.96-3.1_mipsel.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-mips/gnome-gv_1.1.96-3.1_mips.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-m68k/gnome-gv_1.1.96-3.1_m68k.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-ia64/gnome-gv_1.1.96-3.1_ia64.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-i386/gnome-gv_1.1.96-3.1_i386.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-hppa/gnome-gv_1.1.96-3.1_hppa.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-arm/gnome-gv_1.1.96-3.1_arm.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-alpha/gnome-gv_1.1.96-3.1_alpha.deb gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/source/gnome-gv_1.1.96-3.1.diff.gz stable/main/binary-sparc/gnome-gv_1.1.96-3.1_sparc.deb stable/main/source/gnome-gv_1.1.96-3.1.dsc gnome-gv (1.1.96-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security patch from Olaf Kirch to fix buffer overflows including secscanf.c stable/main/binary-sparc/libc6-prof_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-pic_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dbg_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.2_sparc.deb stable/main/binary-sparc/nscd_2.2.5-11.2_sparc.deb stable/main/binary-sparc/libc6-dev_2.2.5-11.2_sparc.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-s390/libc6-pic_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-dev_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-prof_2.2.5-11.2_s390.deb stable/main/binary-s390/libc6-dbg_2.2.5-11.2_s390.deb stable/main/binary-s390/nscd_2.2.5-11.2_s390.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-powerpc/libc6_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.2.5-11.2_powerpc.deb stable/main/binary-powerpc/nscd_2.2.5-11.2_powerpc.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-mipsel/libc6-prof_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/nscd_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.2.5-11.2_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.2.5-11.2_mipsel.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-mips/libc6-dev_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-prof_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-dbg_2.2.5-11.2_mips.deb stable/main/binary-mips/nscd_2.2.5-11.2_mips.deb stable/main/binary-mips/libc6-pic_2.2.5-11.2_mips.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-ia64/libc6.1_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.2.5-11.2_ia64.deb stable/main/binary-ia64/nscd_2.2.5-11.2_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.2_ia64.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-i386/libc6-prof_2.2.5-11.2_i386.deb stable/main/binary-i386/nscd_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-dev_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-pic_2.2.5-11.2_i386.deb stable/main/binary-i386/libc6-dbg_2.2.5-11.2_i386.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-hppa/libc6-dev_2.2.5-11.2_hppa.deb stable/main/binary-hppa/nscd_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-dbg_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-prof_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6_2.2.5-11.2_hppa.deb stable/main/binary-hppa/libc6-pic_2.2.5-11.2_hppa.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-arm/libc6-prof_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-dbg_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-pic_2.2.5-11.2_arm.deb stable/main/binary-arm/libc6-dev_2.2.5-11.2_arm.deb stable/main/binary-arm/nscd_2.2.5-11.2_arm.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-alpha/nscd_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.2.5-11.2_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.2.5-11.2_alpha.deb glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-all/locales_2.2.5-11.2_all.deb stable/main/binary-m68k/libc6-dbg_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6-prof_2.2.5-11.2_m68k.deb stable/main/binary-all/glibc-doc_2.2.5-11.2_all.deb stable/main/binary-m68k/libc6-dev_2.2.5-11.2_m68k.deb stable/main/binary-m68k/libc6-pic_2.2.5-11.2_m68k.deb stable/main/binary-m68k/nscd_2.2.5-11.2_m68k.deb stable/main/source/glibc_2.2.5-11.2.dsc stable/main/source/glibc_2.2.5-11.2.diff.gz glibc (2.2.5-11.2) stable-security; urgency=high * Non-maintainer upload by security team * Activated the patch against XDR and malloc problems *grr* * Added extra patch to malloc.c for security related bug (from -11.1) * Exchanged xhdr/malloc patch with the one from Wolfram Gloger stable/main/binary-s390/g++-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/protoize-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gobjc-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-dbg_2.95.4-11woody1_s390.deb stable/main/binary-s390/cpp-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gcc-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-dev_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-glibc2.2_2.95.4-11woody1_s390.deb stable/main/binary-s390/libstdc++2.10-dev_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-dbg_2.95.4-11woody1_s390.deb stable/main/binary-s390/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_s390.deb stable/main/binary-s390/chill-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/g77-2.95_2.95.4-11woody1_s390.deb stable/main/binary-s390/gpc-2.95_2.95.4-11woody1_s390.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-powerpc/libg++2.8.1.3-dbg_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gcc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-glibc2.2_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gpc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gobjc-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/gcc-2.95-nof_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-dev_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/chill-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/g++-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/cpp-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libg++2.8.1.3-dev_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/g77-2.95_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/libstdc++2.10-dbg_2.95.4-11woody1_powerpc.deb stable/main/binary-powerpc/protoize-2.95_2.95.4-11woody1_powerpc.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-m68k/chill-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-dev_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/protoize-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gobjc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/cpp-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-dbg_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gcc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/gpc-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-dbg_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libstdc++2.10-glibc2.2_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/g77-2.95_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/libg++2.8.1.3-dev_2.95.4-11woody1_m68k.deb stable/main/binary-m68k/g++-2.95_2.95.4-11woody1_m68k.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-arm/g77-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/gobjc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/chill-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/gcc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-dev_2.95.4-11woody1_arm.deb stable/main/binary-arm/cpp-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-dev_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-dbg_2.95.4-11woody1_arm.deb stable/main/binary-arm/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-dbg_2.95.4-11woody1_arm.deb stable/main/binary-arm/gpc-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/g++-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/protoize-2.95_2.95.4-11woody1_arm.deb stable/main/binary-arm/libstdc++2.10-glibc2.2_2.95.4-11woody1_arm.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-alpha/libstdc++2.10-dbg_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/g++-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gpc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libstdc++2.10-dev_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gobjc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libstdc++2.10-glibc2.2_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/cpp-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-dev_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/gcc-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-dbg_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/g77-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/protoize-2.95_2.95.4-11woody1_alpha.deb stable/main/binary-alpha/chill-2.95_2.95.4-11woody1_alpha.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/binary-i386/g77-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/gcc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/gpc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-all/gcc-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/protoize-2.95_2.95.4-11woody1_i386.deb stable/main/binary-all/cpp-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/gobjc-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/libg++2.8.1.3-dev_2.95.4-11woody1_i386.deb stable/main/binary-i386/libstdc++2.10-dev_2.95.4-11woody1_i386.deb stable/main/binary-i386/cpp-2.95_2.95.4-11woody1_i386.deb stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.diff.gz stable/main/binary-all/gpc-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/libg++2.8.1.3-dbg_2.95.4-11woody1_i386.deb stable/main/binary-all/g77-2.95-doc_2.95.4-11woody1_all.deb stable/main/binary-i386/libstdc++2.10-glibc2.2_2.95.4-11woody1_i386.deb stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.dsc stable/main/binary-i386/libstdc++2.10-dbg_2.95.4-11woody1_i386.deb stable/main/binary-i386/g++-2.95_2.95.4-11woody1_i386.deb stable/main/binary-i386/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_i386.deb stable/main/binary-i386/chill-2.95_2.95.4-11woody1_i386.deb gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low * Upload to woody-proposed-updates: - Fix profiling for arm. - Fix internal compiler errors on s390. - Update Pascal release candidate 7 to final release. - Build the protoize-2.95 package again just in case that somebody relies on the protoize-2.95 and unprotoize-2.95 binaries. - No other changes to other compilers and architectures. stable/main/source/gallery_1.2.5-7.woody.0.diff.gz stable/main/source/gallery_1.2.5-7.woody.0.dsc stable/main/binary-all/gallery_1.2.5-7.woody.0_all.deb gallery (1.2.5-7.woody.0) stable-security; urgency=high * SECURITY: fix from upstream CVS to stop remote command execution through $GALLERY_BASEDIR var. stable/main/binary-s390/gaim-common_0.58-2.3_s390.deb stable/main/binary-s390/gaim_0.58-2.3_s390.deb stable/main/binary-s390/gaim-gnome_0.58-2.3_s390.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-powerpc/gaim_0.58-2.3_powerpc.deb stable/main/binary-powerpc/gaim-gnome_0.58-2.3_powerpc.deb stable/main/binary-powerpc/gaim-common_0.58-2.3_powerpc.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-mipsel/gaim-common_0.58-2.3_mipsel.deb stable/main/binary-mipsel/gaim_0.58-2.3_mipsel.deb stable/main/binary-mipsel/gaim-gnome_0.58-2.3_mipsel.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-mips/gaim_0.58-2.3_mips.deb stable/main/binary-mips/gaim-common_0.58-2.3_mips.deb stable/main/binary-mips/gaim-gnome_0.58-2.3_mips.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-m68k/gaim-common_0.58-2.3_m68k.deb stable/main/binary-m68k/gaim_0.58-2.3_m68k.deb stable/main/binary-m68k/gaim-gnome_0.58-2.3_m68k.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-ia64/gaim-gnome_0.58-2.3_ia64.deb stable/main/binary-ia64/gaim_0.58-2.3_ia64.deb stable/main/binary-ia64/gaim-common_0.58-2.3_ia64.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-i386/gaim-gnome_0.58-2.3_i386.deb stable/main/binary-i386/gaim-common_0.58-2.3_i386.deb stable/main/binary-i386/gaim_0.58-2.3_i386.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-hppa/gaim-gnome_0.58-2.3_hppa.deb stable/main/binary-hppa/gaim_0.58-2.3_hppa.deb stable/main/binary-hppa/gaim-common_0.58-2.3_hppa.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-arm/gaim-common_0.58-2.3_arm.deb stable/main/binary-arm/gaim-gnome_0.58-2.3_arm.deb stable/main/binary-arm/gaim_0.58-2.3_arm.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-alpha/gaim-common_0.58-2.3_alpha.deb stable/main/binary-alpha/gaim-gnome_0.58-2.3_alpha.deb stable/main/binary-alpha/gaim_0.58-2.3_alpha.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/source/gaim_0.58-2.3.diff.gz stable/main/binary-sparc/gaim-common_0.58-2.3_sparc.deb stable/main/binary-sparc/gaim_0.58-2.3_sparc.deb stable/main/source/gaim_0.58-2.3.dsc stable/main/binary-sparc/gaim-gnome_0.58-2.3_sparc.deb gaim (1:0.58-2.3) stable-security; urgency=medium * Non-maintainer upload by Security Team * Applied patch from Christopher Blizzard to add a missing malloc() before **argv is actually used. This was introduced in the security patch and tends to crash Gaim. stable/main/binary-s390/fetchmail-ssl_5.9.11-6.1_s390.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.1_powerpc.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.1_mipsel.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mips/fetchmail-ssl_5.9.11-6.1_mips.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.1_m68k.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.1_ia64.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-i386/fetchmail-ssl_5.9.11-6.1_i386.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.1_hppa.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-arm/fetchmail-ssl_5.9.11-6.1_arm.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.1_alpha.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/source/fetchmail-ssl_5.9.11-6.1.dsc stable/main/source/fetchmail-ssl_5.9.11-6.1.diff.gz stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.1_sparc.deb fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-s390/fetchmail_5.9.11-6.1_s390.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-powerpc/fetchmail_5.9.11-6.1_powerpc.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mipsel/fetchmail_5.9.11-6.1_mipsel.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-mips/fetchmail_5.9.11-6.1_mips.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-m68k/fetchmail_5.9.11-6.1_m68k.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-ia64/fetchmail_5.9.11-6.1_ia64.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-i386/fetchmail_5.9.11-6.1_i386.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-hppa/fetchmail_5.9.11-6.1_hppa.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-arm/fetchmail_5.9.11-6.1_arm.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-alpha/fetchmail_5.9.11-6.1_alpha.deb fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-all/fetchmailconf_5.9.11-6.1_all.deb stable/main/source/fetchmail_5.9.11-6.1.dsc stable/main/binary-sparc/fetchmail_5.9.11-6.1_sparc.deb stable/main/binary-all/fetchmail-common_5.9.11-6.1_all.deb stable/main/source/fetchmail_5.9.11-6.1.diff.gz fetchmail (5.9.11-6.1) stable-security; urgency=high * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in multidrop mode (backported from new upstream 6.1.0) stable/main/binary-s390/fam_2.6.6.1-5.2_s390.deb stable/main/binary-s390/libfam-dev_2.6.6.1-5.2_s390.deb stable/main/binary-s390/libfam0_2.6.6.1-5.2_s390.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-powerpc/libfam-dev_2.6.6.1-5.2_powerpc.deb stable/main/binary-powerpc/fam_2.6.6.1-5.2_powerpc.deb stable/main/binary-powerpc/libfam0_2.6.6.1-5.2_powerpc.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-mipsel/fam_2.6.6.1-5.2_mipsel.deb stable/main/binary-mipsel/libfam-dev_2.6.6.1-5.2_mipsel.deb stable/main/binary-mipsel/libfam0_2.6.6.1-5.2_mipsel.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-mips/libfam-dev_2.6.6.1-5.2_mips.deb stable/main/binary-mips/libfam0_2.6.6.1-5.2_mips.deb stable/main/binary-mips/fam_2.6.6.1-5.2_mips.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-m68k/libfam0_2.6.6.1-5.2_m68k.deb stable/main/binary-m68k/libfam-dev_2.6.6.1-5.2_m68k.deb stable/main/binary-m68k/fam_2.6.6.1-5.2_m68k.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-ia64/fam_2.6.6.1-5.2_ia64.deb stable/main/binary-ia64/libfam0_2.6.6.1-5.2_ia64.deb stable/main/binary-ia64/libfam-dev_2.6.6.1-5.2_ia64.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-i386/fam_2.6.6.1-5.2_i386.deb stable/main/binary-i386/libfam0_2.6.6.1-5.2_i386.deb stable/main/binary-i386/libfam-dev_2.6.6.1-5.2_i386.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-hppa/libfam-dev_2.6.6.1-5.2_hppa.deb stable/main/binary-hppa/libfam0_2.6.6.1-5.2_hppa.deb stable/main/binary-hppa/fam_2.6.6.1-5.2_hppa.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-arm/fam_2.6.6.1-5.2_arm.deb stable/main/binary-arm/libfam0_2.6.6.1-5.2_arm.deb stable/main/binary-arm/libfam-dev_2.6.6.1-5.2_arm.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-alpha/libfam0_2.6.6.1-5.2_alpha.deb stable/main/binary-alpha/libfam-dev_2.6.6.1-5.2_alpha.deb stable/main/binary-alpha/fam_2.6.6.1-5.2_alpha.deb fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-sparc/libfam-dev_2.6.6.1-5.2_sparc.deb stable/main/source/fam_2.6.6.1-5.2.diff.gz stable/main/binary-sparc/libfam0_2.6.6.1-5.2_sparc.deb stable/main/binary-sparc/fam_2.6.6.1-5.2_sparc.deb stable/main/source/fam_2.6.6.1-5.2.dsc fam (2.6.6.1-5.2) stable-security; urgency=medium * Non-maintainer upload by security team * Reworked the patch SGI provided, i.e. removed new code, removed variable renaming, removed two potential integer overflows and smoothed the code, so it's a clean patch one can actually grok. * Second version, missed commented out code and string output * Rebuilt for stable-security so we can install it * Included from the maintainer release: . Add Recommends: fam to libfam0 for libfam without fam makes not much sense except for those using fam over the net. . Make dnotify handle the absence of dnotify-fcntl in the kernel and use polling (see: Bug#148853) stable/main/binary-s390/ethereal-common_0.9.4-1woody2_s390.deb stable/main/binary-s390/tethereal_0.9.4-1woody2_s390.deb stable/main/binary-s390/ethereal-dev_0.9.4-1woody2_s390.deb stable/main/binary-s390/ethereal_0.9.4-1woody2_s390.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-powerpc/ethereal_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.9.4-1woody2_powerpc.deb stable/main/binary-powerpc/tethereal_0.9.4-1woody2_powerpc.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-mipsel/ethereal-common_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/tethereal_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody2_mipsel.deb stable/main/binary-mipsel/ethereal_0.9.4-1woody2_mipsel.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-mips/ethereal-dev_0.9.4-1woody2_mips.deb stable/main/binary-mips/ethereal-common_0.9.4-1woody2_mips.deb stable/main/binary-mips/tethereal_0.9.4-1woody2_mips.deb stable/main/binary-mips/ethereal_0.9.4-1woody2_mips.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-m68k/ethereal-dev_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/ethereal-common_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/ethereal_0.9.4-1woody2_m68k.deb stable/main/binary-m68k/tethereal_0.9.4-1woody2_m68k.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-ia64/tethereal_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal-common_0.9.4-1woody2_ia64.deb stable/main/binary-ia64/ethereal-dev_0.9.4-1woody2_ia64.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-i386/ethereal_0.9.4-1woody2_i386.deb stable/main/binary-i386/ethereal-common_0.9.4-1woody2_i386.deb stable/main/binary-i386/tethereal_0.9.4-1woody2_i386.deb stable/main/binary-i386/ethereal-dev_0.9.4-1woody2_i386.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-hppa/ethereal-common_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/tethereal_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/ethereal-dev_0.9.4-1woody2_hppa.deb stable/main/binary-hppa/ethereal_0.9.4-1woody2_hppa.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-arm/ethereal-common_0.9.4-1woody2_arm.deb stable/main/binary-arm/tethereal_0.9.4-1woody2_arm.deb stable/main/binary-arm/ethereal-dev_0.9.4-1woody2_arm.deb stable/main/binary-arm/ethereal_0.9.4-1woody2_arm.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-alpha/ethereal-dev_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/ethereal-common_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/ethereal_0.9.4-1woody2_alpha.deb stable/main/binary-alpha/tethereal_0.9.4-1woody2_alpha.deb ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/binary-sparc/ethereal_0.9.4-1woody2_sparc.deb stable/main/binary-sparc/ethereal-dev_0.9.4-1woody2_sparc.deb stable/main/binary-sparc/ethereal-common_0.9.4-1woody2_sparc.deb stable/main/source/ethereal_0.9.4-1woody2.dsc stable/main/binary-sparc/tethereal_0.9.4-1woody2_sparc.deb stable/main/source/ethereal_0.9.4-1woody2.diff.gz ethereal (0.9.4-1woody2) stable-security; urgency=high * Non-maintainer upload by security team * Applied upstream patch to fixe a buffer overflow in ISIS dissector, denoted as "Use a GString to hold the formatted area address, so that we don't overflow a fixed-length buffer." (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834) stable/main/source/eroaster_2.1.0.0.3-2.dsc stable/main/binary-all/eroaster_2.1.0.0.3-2_all.deb stable/main/source/eroaster_2.1.0.0.3-2.diff.gz eroaster (2.1.0.0.3-2) stable; urgency=low * Fixed a typo that broke image creation with mkisofs if only the image was being created, ie if not part of create image/burn operation (closes: #170277) stable/main/source/epic4-script-light_2.7.30p5-1.1.diff.gz stable/main/binary-all/epic4-script-light_2.7.30p5-1.1_all.deb stable/main/source/epic4-script-light_2.7.30p5-1.1.dsc epic4-script-light (1:2.7.30p5-1.1) stable-security; urgency=high * Non-maintainer upload by Security team * Security update for stable which fixes double evaluation of $-expandos in dangerous cases. * Applied upstream fix for brokenly fixed double evaluation of $-expandos in nickname and channel name when zapping stable/main/binary-alpha/elk_3.0-8.1_alpha.deb elk (3.0-8.1) unstable; urgency=low * NMU. * Added missing build dependencies (closes: #109854, #116532). * Fix menu item (closes: #121004). * Apply patch to make package lintian clean (closes: #126987). * src/build: include debian/arch-config to specify build flags for the alpha (-O0). May fix #59893. stable/main/source/docbook-xml-slides_1.1-2.1woody2.dsc stable/main/source/docbook-xml-slides_1.1-2.1woody2.diff.gz stable/main/binary-all/docbook-xml-slides_1.1-2.1woody2_all.deb docbook-xml-slides (1.1-2.1woody2) stable; urgency=low * Really upload to woody. docbook-xml-slides (1.1-2.1woody1) unstable; urgency=low * Non-maintainer upload. * Backported to woody. docbook-xml-slides (1.1-2.2) unstable; urgency=medium * Non-maintainer upload * Fixed dependency, so that this package can coexist with others (Closes: #157398). This should have been done long ago, I'll be preparing a version for woody as well - I already had to rebuild this package twice, and already explained to other people on IRC how to do that themselves. * Use Build-depends-indep, not just build-depends, as lintian noticed. stable/main/binary-powerpc/dietlibc-dev_0.12-2.4_powerpc.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-mipsel/dietlibc-dev_0.12-2.4_mipsel.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-mips/dietlibc-dev_0.12-2.4_mips.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-i386/dietlibc-dev_0.12-2.4_i386.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-arm/dietlibc-dev_0.12-2.4_arm.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/binary-alpha/dietlibc-dev_0.12-2.4_alpha.deb dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/source/dietlibc_0.12-2.4.diff.gz stable/main/binary-all/dietlibc-doc_0.12-2.4_all.deb stable/main/binary-sparc/dietlibc-dev_0.12-2.4_sparc.deb stable/main/source/dietlibc_0.12-2.4.dsc dietlibc (0.12-2.4) stable-security; urgency=medium * Fix potential division by zero chance in calloc integer overflow check (discussed with and forwarded from upstream). stable/main/source/defrag_0.73pjm1-1.woody.0.dsc stable/main/binary-i386/defrag_0.73pjm1-1.woody.0_i386.deb stable/main/source/defrag_0.73pjm1-1.woody.0.diff.gz defrag (0.73pjm1-1.woody.0) stable; urgency=high * debian/control: fixed speling erorr in package description (closes: #124541) * debian/copyright: fixed mis-spelling common-licences -> common-licenses * ext2.c: Gracefully fail on filesystems with journals (closes: #118635). This fixes a bug that causes filesystem corruption when defrag is run on ext3 filesystems. stable/main/source/debiandoc-sgml_1.1.67woody1.dsc stable/main/source/debiandoc-sgml_1.1.67woody1.tar.gz stable/main/binary-all/debiandoc-sgml_1.1.67woody1_all.deb debiandoc-sgml (1.1.67woody1) stable; urgency=low * debian/postinst: added invocation of 'install-sgmlcatalog --remove debiandoc-sgml' to clean up cruft potentially left over from the SGML catalog transition in a potato -> woody upgrade (closes: Bug#154737) stable/main/source/cron-apt_0.0.6woody1.tar.gz stable/main/source/cron-apt_0.0.6woody1.dsc stable/main/binary-all/cron-apt_0.0.6woody1_all.deb cron-apt (0.0.6woody1) stable; urgency=high * Added default path so the upgrade will work fine. Thanks to Donovan Baarda for pointing out the problem. Closes: #158869. This is a backport from version 0.0.7 which has been tested for a couple of months without any reports of failure. stable/main/binary-sparc/courier-mta_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-debug_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-authmysql_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-pop_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-webadmin_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-maildrop_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-base_0.37.3-2.3_sparc.deb stable/main/binary-sparc/sqwebmail_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-imap_1.4.3-2.3_sparc.deb stable/main/binary-sparc/courier-mlm_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-authdaemon_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-pcp_0.37.3-2.3_sparc.deb stable/main/binary-sparc/courier-ldap_0.37.3-2.3_sparc.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-s390/courier-maildrop_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-ldap_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-imap_1.4.3-2.3_s390.deb stable/main/binary-s390/courier-authdaemon_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-pop_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-pcp_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-webadmin_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-authmysql_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-mta_0.37.3-2.3_s390.deb stable/main/binary-s390/sqwebmail_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-mlm_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-debug_0.37.3-2.3_s390.deb stable/main/binary-s390/courier-base_0.37.3-2.3_s390.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-powerpc/courier-pcp_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-webadmin_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-pop_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-maildrop_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/sqwebmail_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-base_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-ldap_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-authmysql_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-imap_1.4.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-mlm_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-mta_0.37.3-2.3_powerpc.deb stable/main/binary-powerpc/courier-debug_0.37.3-2.3_powerpc.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mips/courier-authmysql_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-imap_1.4.3-2.3_mips.deb stable/main/binary-mips/courier-pop_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-webadmin_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-maildrop_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-ldap_0.37.3-2.3_mips.deb stable/main/binary-mips/sqwebmail_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-mlm_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-pcp_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-mta_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-base_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-debug_0.37.3-2.3_mips.deb stable/main/binary-mips/courier-authdaemon_0.37.3-2.3_mips.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-m68k/courier-authmysql_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-ldap_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-webadmin_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-imap_1.4.3-2.3_m68k.deb stable/main/binary-m68k/courier-maildrop_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-base_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-authdaemon_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-pcp_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-debug_0.37.3-2.3_m68k.deb stable/main/binary-m68k/sqwebmail_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-mta_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-mlm_0.37.3-2.3_m68k.deb stable/main/binary-m68k/courier-pop_0.37.3-2.3_m68k.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-ia64/courier-imap_1.4.3-2.3_ia64.deb stable/main/binary-ia64/courier-authdaemon_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-pop_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-authmysql_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-base_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-ldap_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-pcp_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-mta_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-maildrop_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-debug_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-mlm_0.37.3-2.3_ia64.deb stable/main/binary-ia64/sqwebmail_0.37.3-2.3_ia64.deb stable/main/binary-ia64/courier-webadmin_0.37.3-2.3_ia64.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-i386/courier-base_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-mta_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-authdaemon_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-webadmin_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-pop_0.37.3-2.3_i386.deb stable/main/binary-i386/sqwebmail_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-imap_1.4.3-2.3_i386.deb stable/main/binary-i386/courier-maildrop_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-mlm_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-debug_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-authmysql_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-ldap_0.37.3-2.3_i386.deb stable/main/binary-i386/courier-pcp_0.37.3-2.3_i386.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-hppa/courier-base_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-webadmin_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-pop_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-mta_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-maildrop_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-imap_1.4.3-2.3_hppa.deb stable/main/binary-hppa/courier-authdaemon_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-mlm_0.37.3-2.3_hppa.deb stable/main/binary-hppa/sqwebmail_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-ldap_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-pcp_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-debug_0.37.3-2.3_hppa.deb stable/main/binary-hppa/courier-authmysql_0.37.3-2.3_hppa.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-arm/courier-debug_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-ldap_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-authmysql_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-base_0.37.3-2.3_arm.deb stable/main/binary-arm/sqwebmail_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-imap_1.4.3-2.3_arm.deb stable/main/binary-arm/courier-maildrop_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-mlm_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-pop_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-webadmin_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-pcp_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-authdaemon_0.37.3-2.3_arm.deb stable/main/binary-arm/courier-mta_0.37.3-2.3_arm.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-alpha/courier-mta_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-maildrop_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-authdaemon_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-authmysql_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-webadmin_0.37.3-2.3_alpha.deb stable/main/binary-alpha/sqwebmail_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-imap_1.4.3-2.3_alpha.deb stable/main/binary-alpha/courier-ldap_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-mlm_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-pcp_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-pop_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-debug_0.37.3-2.3_alpha.deb stable/main/binary-alpha/courier-base_0.37.3-2.3_alpha.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-mipsel/courier-ldap_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-imap_1.4.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-maildrop_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-mlm_0.37.3-2.3_mipsel.deb stable/main/binary-all/courier-doc_0.37.3-2.3_all.deb stable/main/binary-mipsel/courier-webadmin_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-pop_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-pcp_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-authmysql_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-mta_0.37.3-2.3_mipsel.deb stable/main/source/courier_0.37.3-2.3.dsc stable/main/binary-mipsel/sqwebmail_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-base_0.37.3-2.3_mipsel.deb stable/main/binary-mipsel/courier-debug_0.37.3-2.3_mipsel.deb stable/main/source/courier_0.37.3-2.3.diff.gz stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.3_mipsel.deb courier (0.37.3-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/main/binary-all/bugzilla-doc_2.14.2-0woody2_all.deb stable/main/source/bugzilla_2.14.2-0woody2.dsc stable/main/binary-all/bugzilla_2.14.2-0woody2_all.deb stable/main/source/bugzilla_2.14.2-0woody2.diff.gz bugzilla (2.14.2-0woody2) stable-security; urgency=high * Non-maintainer upload by security team * Fixed bit handling for new products to avoid errors in group handling triggered by not exact Perl maths beyond 2^48. Backport from new upstream 2.14.4. stable/main/binary-sparc/bastille_1.3.0-2.1_sparc.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-s390/bastille_1.3.0-2.1_s390.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-powerpc/bastille_1.3.0-2.1_powerpc.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mipsel/bastille_1.3.0-2.1_mipsel.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mips/bastille_1.3.0-2.1_mips.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-m68k/bastille_1.3.0-2.1_m68k.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-ia64/bastille_1.3.0-2.1_ia64.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-hppa/bastille_1.3.0-2.1_hppa.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-arm/bastille_1.3.0-2.1_arm.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-alpha/bastille_1.3.0-2.1_alpha.deb bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/source/bastille_1.3.0-2.1.dsc stable/main/binary-i386/bastille_1.3.0-2.1_i386.deb stable/main/source/bastille_1.3.0-2.1.diff.gz bastille (1:1.3.0-2.1) stable; urgency=medium * This is a release only for woodyr1. For production environments, however, Bastille-1.3.0-6 (or 2.0 is recommended) * Fixed Bastille/Logging.pm (Closes: #158803) * Fixed Bastille/Firewall.pm so that it installs the firewalling script (Closes: #147643) * Removed psad from this package (in 'sid' it's a separate package so it also helps transition). This includes modifying debian/rules, removing the PSAD stuff from Questions.txt (otherwise the backend does not know where to jump to) and changing the 'Required Distro' to exclude Debian (DB is already there in Questions.txt wherever LINUX is) (Closes: #150614) stable/main/binary-mips/arcboot_0.3.3.9.woody.0_mips.deb stable/main/source/arcboot_0.3.3.9.woody.0.dsc stable/main/source/arcboot_0.3.3.9.woody.0.tar.gz stable/main/binary-mips/tip22_0.3.3.9.woody.0_mips.deb arcboot (0.3.3.9.woody.0) stable; urgency=medium * recompile 0.3.4 for Woody r1: - fix loader crashes on extfs errors - add tip22 (piggyback style tftp loader) needed by boot floppies for kernels newer then 2.4.16 * disable debugging output stable/main/binary-s390/apache-ssl_1.3.26.1+1.48-0woody3_s390.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-ssl_1.3.26.1+1.48-0woody3_powerpc.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache-ssl_1.3.26.1+1.48-0woody3_mipsel.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache-ssl_1.3.26.1+1.48-0woody3_mips.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-ssl_1.3.26.1+1.48-0woody3_m68k.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache-ssl_1.3.26.1+1.48-0woody3_ia64.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-ssl_1.3.26.1+1.48-0woody3_i386.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-ssl_1.3.26.1+1.48-0woody3_hppa.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-ssl_1.3.26.1+1.48-0woody3_arm.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache-ssl_1.3.26.1+1.48-0woody3_alpha.deb apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.diff.gz stable/main/binary-sparc/apache-ssl_1.3.26.1+1.48-0woody3_sparc.deb stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.dsc apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-s390/apache-perl_1.3.26-1-1.26-0woody2_s390.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-perl_1.3.26-1-1.26-0woody2_powerpc.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache-perl_1.3.26-1-1.26-0woody2_mipsel.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache-perl_1.3.26-1-1.26-0woody2_mips.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-perl_1.3.26-1-1.26-0woody2_m68k.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache-perl_1.3.26-1-1.26-0woody2_ia64.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-perl_1.3.26-1-1.26-0woody2_i386.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-perl_1.3.26-1-1.26-0woody2_hppa.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-perl_1.3.26-1-1.26-0woody2_arm.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache-perl_1.3.26-1-1.26-0woody2_alpha.deb apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-sparc/apache-perl_1.3.26-1-1.26-0woody2_sparc.deb stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.dsc stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.tar.gz apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport security fixes from 1.3.27 for the following issues: - CAN-2002-0839 (shared memory scoreboard uid/gid) - CAN-2002-0840 (cross-site scripting in error page) - CAN-2002-0843 (buffer overflows in ApacheBench ab.c) * Fix insecure temporary file creation in htpasswd and htdigest * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-s390/apache-dev_1.3.26-0woody3_s390.deb stable/main/binary-s390/apache-common_1.3.26-0woody3_s390.deb stable/main/binary-s390/apache_1.3.26-0woody3_s390.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/apache-dev_1.3.26-0woody3_powerpc.deb stable/main/binary-powerpc/apache_1.3.26-0woody3_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.26-0woody3_powerpc.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mipsel/apache_1.3.26-0woody3_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.26-0woody3_mipsel.deb stable/main/binary-mipsel/apache-dev_1.3.26-0woody3_mipsel.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-mips/apache_1.3.26-0woody3_mips.deb stable/main/binary-mips/apache-dev_1.3.26-0woody3_mips.deb stable/main/binary-mips/apache-common_1.3.26-0woody3_mips.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-m68k/apache-dev_1.3.26-0woody3_m68k.deb stable/main/binary-m68k/apache_1.3.26-0woody3_m68k.deb stable/main/binary-m68k/apache-common_1.3.26-0woody3_m68k.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-ia64/apache_1.3.26-0woody3_ia64.deb stable/main/binary-ia64/apache-dev_1.3.26-0woody3_ia64.deb stable/main/binary-ia64/apache-common_1.3.26-0woody3_ia64.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-i386/apache-common_1.3.26-0woody3_i386.deb stable/main/binary-i386/apache-dev_1.3.26-0woody3_i386.deb stable/main/binary-i386/apache_1.3.26-0woody3_i386.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-hppa/apache-common_1.3.26-0woody3_hppa.deb stable/main/binary-hppa/apache_1.3.26-0woody3_hppa.deb stable/main/binary-hppa/apache-dev_1.3.26-0woody3_hppa.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-arm/apache-common_1.3.26-0woody3_arm.deb stable/main/binary-arm/apache_1.3.26-0woody3_arm.deb stable/main/binary-arm/apache-dev_1.3.26-0woody3_arm.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-alpha/apache_1.3.26-0woody3_alpha.deb stable/main/binary-alpha/apache-dev_1.3.26-0woody3_alpha.deb stable/main/binary-alpha/apache-common_1.3.26-0woody3_alpha.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-sparc/apache-dev_1.3.26-0woody3_sparc.deb stable/main/source/apache_1.3.26-0woody3.diff.gz stable/main/binary-sparc/apache_1.3.26-0woody3_sparc.deb stable/main/binary-sparc/apache-common_1.3.26-0woody3_sparc.deb stable/main/source/apache_1.3.26-0woody3.dsc stable/main/binary-all/apache-doc_1.3.26-0woody3_all.deb apache (1.3.26-0woody3) stable-security; urgency=medium * Added another fix against two overflowed buffer in the htdigest program stable/main/binary-powerpc/afterstep_1.8.11-5woody1_powerpc.deb afterstep (1.8.11-5woody1) stable; urgency=low * Upload file overlapping fix from 1.8.11-5 to woody. stable/main/binary-arm/afterstep_1.8.11-5woody1_arm.deb afterstep (1.8.11-5woody1) testing; urgency=low * Upload file overlapping fix from 1.8.11-5 to woody. ========================================= Sat, 20 Jul 2002 - Debian 3.0r0 released =========================================